Explore CashPro®

A single portal that shows your
total position wherever you're positioned.

CashPro® Online

Explore CashPro®

The power of CashPro® to go.
CashPro® Mobile

Learn more >

Explore CashPro®

Global, integrated file access solutions.
CashPro® Connect

Learn more >

Awards & Recognition

  • Best Global Transaction Services House
    Euromoney Awards for Excellence, 2014
  • Best Technology Platform Winner - Tata Communications
    The Corporate Treasurer, 2014
  • Innovative Feature Winner - CashPro Online Dashboard
    Monarch Innovation Award, 2013

CashPro® Online Security

CashPro® Online offers robust security features, which include:

Strong Authentication

Strong two-factor authentication for sensitive payment applications helps safeguard transactions. This feature, the Multi-key SafePass™ token, is also is available at login but optional per client request. Login also includes risk‑based authentication to allow you to register multiple PCs for additional protection.

CashPro Online Features

The SSL protocol continuously verifies the identity of each party during the session, encrypting messages to help ensure they remain private and unaltered.

Future Vision

Our Security Operations Center provides monitoring 24 hours a day, seven days a week to help detect unauthorized network and application activity by:

  • Tracking status and availability of security devices
  • Identifying and removing vulnerabilities
  • Managing network protection devices including firewall, anti-virus, intrusion detection and prevention systems
  • Responding to security events

Automatic Logout

The system logs out users after 30 minutes of inactivity.

Password Expiration

Users are prompted to change and confirm their passwords every 90 days.

Customized Authorization and Entitlement

Comprehensive user authorization with dual administration features let you set the level of system access for each user by service, by function or by transaction amount. Users are able to perform only approved functions. With segregation of duties, you can require multiple approvals for initiation, approval and release authorization of transactions.

Audit Log

Activity logs monitor and record all system and user activities.