Login icon Login
Phone icon +44 20 3514 6747

At Roubler, we know that our customers rely on us as an important part of their business processes.

We take this responsibility to our customers very seriously, and the security and reliability of the software, systems and data that make up the Roubler suite of products are our top priority.


Infrastructure Security

The Roubler application is hosted and managed within the Amazon Web Services (AWS) cloud computing infrastructure – the most secure cloud computing environment available today. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. AWS inherently protects from threats by applying security controls at every layer – from physical to application – isolating applications and data, whilst rapidly deploying security updates without service interruption. As a result, the Roubler application is afforded all the benefits of being hosted on the AWS infrastructure, including:

Additionally, AWS provides certification reports that describe how the AWS Cloud infrastructure meets the requirements of an extensive list of global security standards, allowing ROUBLER to meet specific government, industry, and company security standards and regulations, including:

For more information, please see the AWS Security page.

Application Security

The ROUBLER web application adopts the OWASP Top Ten and OWASP Mobile Top Ten as a means of ensuring application code is free from flaws and security vulnerabilities. The OWASP Top Ten is a set of powerful awareness document for web and mobile application security. The OWASP Top Ten represents a broad consensus about what the most critical web and mobile application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce a list of the top ten security vulnerabilities affecting web and mobile applications.

Adopting the OWASP Top Ten ensures Roubler is protected against:

  1. Injection
  2. Broken Authentication and Session Management
  3. Cross-Site Scripting (XSS)
  4. Insecure Direct Object References
  5. Security Misconfiguration
  6. Sensitive Data Exposure
  7. Missing Function Level Access Control
  8. Cross-Site Request Forgery (CSRF)
  9. Using Components with Known Vulnerabilities
  10. Unvalidated Redirects and Forwards

Adopting the OWASP Mobile Top Ten ensures Roubler is protected against:

  1. Weak Server Side Controls
  2. Insecure Data Storage
  3. Insufficient Transport Layer Protection
  4. Unintended Data Leakage
  5. Poor Authorisation and Authentication
  6. Broken Cryptography
  7. Client Side Injection
  8. Security Decisions Via Untrusted Inputs
  9. Improper Session Handling
  10. Lack of Binary Protections

Additionally, all Roubler technical staff receive OWSAP Top 10 training. The training takes staff through a practical approach to the following secure coding principles:

For more information, please see the OWASP website.

Payments Security

The Roubler application uses the Braintree payments service for the secure transaction and storage of all payments. Braintree focuses on providing a secure environment that goes above and beyond industry security standards and guidelines. Braintree is a validated Level 1 PCI DSS Compliant Service Provider, and are on Visa’s Global Compliant Provider List and MasterCard’s SDP List.

Braintree is certified to PCI Service Provider Level 1, the most stringent level of certification, actively works to protect against fraudulent charges and monitors suspicious transactions.

For more information, please see the Braintree website.

Vulnerability Management and Penetration Testing

Roubler undergoes monthly vulnerability assessments conducted by Nessus Cloud and biannual penetration testing conducted by HackLabs, with all high and critical vulnerabilities being addressed immediately. Nessus is a PCI DSS Approved Scanning Vendor (ASV) and provides cloud-based scanning and detection of web server vulnerabilities, known and unknown web application vulnerabilities, and configuration auditing of the Roubler web application platform. HackLabs is a Security Consulting Company specialising in Penetration Testing.

For more information, please see the Nessus Cloud and HackLabs pages.

Secure Access

All Roubler employees are equipped with secure laptop computers with encryption and antivirus software centrally installed, configured and managed. Technical staff undergo training on relevant security matters that pertain to their job.

More Information

If you have any security concerns or questions, feel free to contact us at security@roubler.com.

We will always respect your privacy. We will treat your personal details with the utmost care, and will never sell your information to any third parties. If you choose to receive occasional updates and advice on how to grow your business you can unsubscribe at any time. View our Privacy Policy here.

Our cookies give you a great online experience and make our website work. We also use cookies to see how our website is used and help provide tailored online content. Please click "Accept" below to continue to experience the full functionality of our website.

Please click "Accept All Cookies" below to continue to experience the full functionality of our website.