Evervault Features
Encryption (3)
File Transfer Encryption
Protects data with within or as it leaves your secure or local network.
Data Encryption
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Document Encryption
Provides a level of encryption for text documents.
Compliance (5)
Authentication
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging
Policy Enforcement
Abilities to set standards for database security and risk management.
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
-
GDPR compliant
Meets GDPR requirements for pseudonymisation under the Data Protection by Design and by Default requirements.
-
CCPA compliant
Meets de-identification requirements under the CCPA.
Management (4)
Backup
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Recovery
Decrypts datasets or files or allows users access to a backup database for reintegration.
File Management
Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.
Anomaly Detection
Monitors activity within networks and alerts administrators when unusual activity occurs.
Data Masking (5)
Sensitive Fields
The ability to create fields that automatically mask data such as credit card numbers or passwords.
Dynamic Masking
The ability to mask data in real time as it is entered.
Static Masking
The ability to apply or remove masking after data has been entered.
Consistent Masking
Tools to mask data using a consistent ruleset.
Random Masking
Tools to mask data using random characters and data.
Connectivity (2)
-
Mobile SDK
Connects to mobile platforms using a mobile SDK.
-
Web services APIs
Offers APIs to connect products.
Architecture (3)
Unified API
Deliver application programming interfaces (APIs) to integrate payment solutions easily
POL
Suppoprt payment orchestration layers (POL) to unify multiple types of payments from different providers
Integrations
Provide built-in integrations with payment gateways and payment processing solutions
Processing (5)
Validation
Validate payments before processing to determine the best routing options
Automation
Define and manage automated payment processing, from authorization to settlement
Cross Border
Support cross border and international payments for B2C and B2B
Routing
Include multiple routing options for payments that can be customized by users
Reconciliation
Compare payment transactions with bank statements and financial records
Risk & Compliance (3)
Failed payments
Re-route failed payments to alternative payment processing options
Tokenization
Use tokens to protect payments data by replacing it with data generated by algorithms
Compliance
Comply with privacy and security regulations such as PCI and PSD2
Analytics (3)
Consolidation
Centralize payments data from multiple sources such as gateways or payment service providers
Optimization
Use payments data to improve processing and success rates, as well as reduce costs
Fraud
Identify suspicious payers and analyze fraudulent transactions
Threat Detection and Protection - Client-Side Protection (5)
Continuous Scanning
Continuously scans websites and applications to detect suspicious activities.
Signature-Based Detection
Performs signature-based detection for known threats.
Threat Protection
Protects against a wide range of client-side threats, including XSS attacks, formjacking, digital skimming, and Magecart exploits.
Risk Prioritization
Prioritizes the script's degree of risk based on its behavior.
Heuristic Analysis
Performs heuristic analysis to identify suspicious behavior.
Data Security - Client-Side Protection (6)
First-Party JavaScript Obfuscation
Obscures first-party Javascript code to make it less readable and harder to understand.
Browser Security
Protects against browser-based attacks (e.g., XSS, CSRF) and bloc malicious scripts.
Encryption
Encrypts data in transit and at rest.
Data Loss Prevention (DLP)
Monitors and prevents data leakage by blocking destinations that are unknown or have illegitimate parameters.
Third-Party Security
Discovers third-party services automatically and continuously with detailed activity tracking.
Endpoint Security
Protects against endpoint attacks such as ransomware and phishing.
Logging and Monitoring - Client-Side Protection (3)
Event Logging
Logs events for security incidents and policy violations.
Reporting
Provides actionable insights and reports for clear visibility into security incidents, vulnerabilities, and compliance status.
Real-Time Monitoring
Monitors client-side activities in real time.
Agentic AI - Payments Orchestration (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases



