Your money is always protected. Feel secure with advanced features built to shield your business from the most sophisticated threats.
Customer funds are held in ring-fenced accounts separate from our own, and in partnership with the financial industry’s leading infrastructure providers. Your money is always safeguarded – accessible to you alone.
Learn more
Our data is encrypted. We use industry standard and approved cryptographic algorithms, and the best key management available, with strict user access control and multi-factor authentication.
We partner with industry-leading financial and technical service providers with a track record of safe and reliable service – and rigorous standards. Mastercard, Banking Circle and Marqeta, to name a few.
You control who can use your account – and how. Authorise users to make or approve payments, or restrict third parties to view-only status. You can also choose to hide sensitive financial information.
Control spend down to the last cent. Set custom limits on each card to cap spend before it happens, and always stay within budget.
We monitor transactions 24 hours a day. All payment traffic is screened, logged and analysed to detect and understand suspicious activity. If our service is abused, we will terminate and block the user's account immediately.
You can add your Juni cards to your digital wallet to make fast and secure payments in store, apps and online. Card information isn’t stored on devices or shared with merchants.
We uphold PCI compliance to safeguard sensitive information, and ensure your card details are kept safe at all times.
We’re independently certified to the ISO/IEC 27001:2022 standard, recognising that we’ve built, and maintain, strict security protocols and processes.
We take privacy very seriously, and are committed to acting in compliance with data protection laws in all aspects of our business.
Juni Match for Gmail has been audited by a certified Google partner, and is compliant with Google T&Cs. Learn how we process your personal data in our Privacy Policy.
We robustly verify customer details at onboarding, and regularly thereafter. This limits any potential for bad actors to use our platform to harm or exploit others.
We perform regular external and internal penetration tests by independent contractors. We also do continuous vulnerability scans, both in code, third party libraries, and networks in order to find and address any vulnerabilities.
Our infrastructure runs on Amazon Web Services (AWS), our industry’s leading cloud services and data security provider. Arguably the most audited system of all time, their security practices are second to none.
Our security processes consider every aspect of product and infrastructure development, from design phase right through to deployment. All development undergoes a strict set of security tests and reviews.
We monitor transactions 24 hours a day. All payment traffic is screened, logged and analysed to detect and understand suspicious activity. If our service is abused, we will terminate and block the user's account immediately.