Infrastructure Powered by DLT
for Better Security & Transparency

CAMS is built on an advanced infrastructure that uses DLT (Distributed Ledger Technology) to offer more secure and transparent payments. Multiple mobile network operators, banks, and financial organizations can connect on the infrastructure, enabling faster, cheaper, and more transparent ways to transfer value and share data.

Benefits of DLT

Built-in trust to remove the possibilities of fraud

Interoperability that goes beyond the region of operation or industry

Immutably stored data can be shared safely and instantly

Vast entrepreneurial opportunities for mobile network operators and banks

Wakandi Core – Powerhouse of Wakandi’s infrastructure 

Wakandi Core is an advanced system consisting of APIs and DLT that powers the infrastructure and all its functions. It connects users on the infrastructure and lets them create, track, and manage transactions. 

One standard for seamless connectivity.

High grade security to protect your data

The security of our users is a priority at Wakandi.
Our tech team constantly works on improving the security of our app to protect the personal information of our users.

High grade security to protect your data

  • In-app security
  • DLT-based system for secure data storage
  • Latest cryptography techniques to protect sensitive information
  • Separate databases to store the user, SACCO and transaction data
  • Information security to protect data from unauthorized access
  • SSL certificate for internet connection security and safeguarding sensitive data
  • Automatic lockout of accounts after multiple logins and registration attempts
  • Permission-based user data access
  • Data security to protect sensitive information submitted in forms
  • Database replication to replicate the database on backup and failover servers
  • 2-factor authentication protection on registration and forgot password 

Data-servers security

  • AAA (Authentication, Authorization and Accounting) security model to control the access to network resources and enforce access policies
  • Triple-Homed Firewall
  • Dedicated and security vetted data center administrators
  • Unified Threat Management (UTM) services to mitigate Denial of Service (DoS) and distributed DoS (DDoS) attacks
  • Stringent Encryption Standards such as 3-DES, AES and Blowfish
  • Remote Authentication Dial-In User Service (RADIUS)
  • 24/7 site security team and CCTV surveillance
  • Fire detection and alarm systems

External auditing of security measures

We conduct periodic external auditing on our app to make sure that the user data remains secure and protected. We ensure to pass each security test and have more sophisticated security measures in place.

Insights and Blogs