FAQs
The Core Product
What is Lune’s Transactions Enrichment Engine?
Our innovative Transactions Enrichment Engine is a remarkable data processing and analysis tool tailor-made for the dynamic Fintech industry. It harnesses the power of advanced algorithms and avant-garde machine learning techniques to elevate and enhance transactional data, unlocking invaluable insights and significantly improving the overall quality of data.
How does Lune’s Transactions Enrichment Engine work?
The engine readily accepts raw transactional data and employs a range of data processing techniques to cleanse, validate, and augment the data. By leveraging advanced algorithms, it proficiently categorizes transactions, extracts pertinent details, and assigns standardized labels.
Can Lune’s Transactions Enrichment Engine handle large volumes of data?
Absolutely! Our engine is designed to handle large-scale data processing efficiently. It can scale horizontally to accommodate increasing data volumes, ensuring optimal performance and minimal processing time.
How can my business use Lune’s Transactions Enrichment Engine?
Experience the seamless integration of our Transaction Enrichment Engine through our convenient plug and play API solution. By simply passing transaction information through Lune's API, you can effortlessly leverage the power of our engine. The API processes the data and returns the enriched information in a structured format, enabling you to easily integrate and utilize the enhanced data within your systems.
How can I get access to test Lune’s API?
To gain access to the Lune’s API, it is required to acquire an API key or authentication credentials from Lune. These credentials play a vital role in authenticating and authorizing your requests to the API. Once you possess the requisite credentials, you can utilize a preferred programming language or tool to make HTTP requests to the designated API endpoints. This enables you to seamlessly begin passing your transactions through the API for processing and enrichment.
Security
How is Lune compliant with data privacy and security regulations?
We prioritize data protection through various measures in our security framework. Here are some key steps we take:
Data Encryption:
- We ensure data security at rest by utilizing cloud-managed service encryption.
- Data in transit is safeguarded through the use of HTTPS for all transactions, providing a secure communication channel.
Regional Data Storage:
- We store data in regions that are specifically located within the customer's country.
- For example, our UAE clients' data is stored in the Azure uaenorth region, ensuring compliance with local data residency requirements.
Pursuing ISO Certification:
- As part of our commitment to robust security practices, we are actively working on obtaining ISO certification.
- This involves engaging a reputable third-party organization that will conduct a comprehensive security assessment of our entire system.
- The certification process verifies our adherence to established security standards and provides an independent validation of our security practices.
By implementing these measures, we strive to maintain the highest standards of data protection and reassure our clients of the security and integrity of their information.
What kind of controls have been implemented based on Lune’s risk assessment?
Our approach to cybersecurity controls is centered around implementing robust measures to safeguard our business operations. Here are the key aspects of our strategy
Public Access Management:
- We ensure secure public access through the utilization of Azure Firewall endpoints.
- The firewall grants granular access controls up to the application layer (Layer 7).
- It also facilitates Network Address Translation (NATing) to our internally hosted k8s cluster endpoint.
Secret Management Solution:
- To effectively manage keys, we have developed an in-house solution.
- Our solution leverages AWS Secret Manager, AWS Lambda functions, and Azure Key Vault.
Network Isolation:
- We maintain a strong network segregation by dividing resources into different k8s namespaces.
Zero Trust Implementation with Istio Service Mesh:
- As part of our ongoing efforts, we are in the process of implementing a zero trust environment using Istio service mesh. This serves as a compelling selling point.
- The service mesh plays a crucial role in establishing Role-Based Access Control (RBAC) policies.
- Additionally, it enforces mutual TLS authentication for internal service communication.
Managed Database Solutions:
- To ensure data security, we utilize managed services for our PostgreSQL databases.
- These solutions provide comprehensive management and protection of our data.
Highly Available and Auto-Scalable k8s Environment:
- Our k8s environment is designed for high availability and supports automatic scaling. This ensures seamless operations and accommodates fluctuations in demand.
Do you provide any support for compliance with data privacy regulations, such as GDPR or PII, helping us stay in compliance and avoid potential legal issues?
As a software company, we understand the importance of data privacy regulations such as GDPR (General Data Protection Regulation). While we don't collect personally identifiable information (PII) or user-specific data ourselves, we acknowledge the significance of compliance with data privacy regulations.It is essential to note that as the client, you retain control over your own data. Our role is to provide services like SDK components that work with your data, and we operate in accordance with your data privacy policies and regulations.