Skip to content

Infrastructure Powered by Technology for Better Security & Transparency

Wakandi is built on an advanced infrastructure to offer more secure and transparent payments. Multiple mobile network operators, banks, and financial organizations can connect on the infrastructure, enabling faster, cheaper, and more transparent ways to transfer value and share data.

Built-in trust (2)
Built-in trust to remove the possibilities of fraud
industry
Interoperability that goes beyond the region of operation or industry
Immutably
Immutably stored data can be shared safely and instantly
banks
Vast entrepreneurial opportunities for mobile network operators and banks

Wakandi Core – Powerhouse of Wakandi’s infrastructure

Wakandi Core is an advanced system consisting of APIs that powers the infrastructure and all its functions. It connects users on the infrastructure and lets them create, track, and manage transactions. 

One standard for seamless connectivity.

High grade security to protect your data

The security of our users is a priority at Wakandi. Our tech team constantly works on improving the security of our app to protect the personal information of our users.

  • In-app security
  • Secure data storage
  • Latest cryptography techniques to protect sensitive information
  • Separate databases to store the user, SACCO and transaction data
  • Information security to protect data from unauthorized access
  • SSL certificate for internet connection security and safeguarding sensitive data
  • Automatic lockout of accounts after multiple logins and registration attempts
  • Permission-based user data access
  • Data security to protect sensitive information submitted in forms
  • Database replication to replicate the database on backup and failover servers
  • 2-factor authentication protection on registration and forgot password 
High grade security to protect your data
Data-servers security

Data-servers security

  • AAA (Authentication, Authorization and Accounting) security model to control the access to network resources and enforce access policies
  • Triple-Homed Firewall
  • Dedicated and security-vetted data center administrators
  • Unified Threat Management (UTM) services to mitigate Denial of Service (DoS) and distributed DoS (DDoS) attacks
  • Stringent Encryption Standards such as 3-DES, AES and Blowfish
  • Remote Authentication Dial-In User Service (RADIUS)
  • 24/7 site security team and CCTV surveillance
  • Fire detection and alarm systems

 

External auditing of security measures

We conduct periodic external auditing on our app to make sure that the user data remains secure and protected. We ensure to pass each security test and have more sophisticated security measures in place.

Insights and Blogs