iMocha
  • Home
  • About Us
    • Company Profile
    • Our Clients
    • Our Partners
  • Solutions
    • By Industries
      • Banking and Financial Services
        • Online Transaction Banking
        • FPX & Direct Debit
        • NBPS Gateway
        • Loan Origination
        • Third Party Disbursement Management
      • Cash & Treasury Management
      • Insurance
        • Insurance Agency Management System
        • Comprehensive Insurance Sales Tool
        • Employee Benefits Digitisation
      • FinTech
      • Digital Transformation
    • By Products
      • Omnichannel Digital Banking
      • Payment Processing
      • Loan Origination & Management
      • Cash & Treasury
      • Omnichannel Digital Insurance
      • Mobile Solution & Development
      • e-Commerce
      • Open API
      • SWIFT Connectivity
      • Secure Cloud
      • End Point Security
      • BI and Analytics
      • AI and Chatbots
  • Products
    • Vizardry
    • Vericos
    • Vibrium
    • Vanquero
    • NEW! Temperature Scanner
    • NEW! Digital Solutions
  • Contact
  • News

Get In Touch

Contact Us

Please drop us a message if you need assistance and further information about our products, features and services. We aim to respond to you promptly. We thank you in advance for your interest in our company and our products.

Contact Info

29-6, The Boulevard Offices, Mid Valley City, Lingkaran Syed Putra, 59200, Kuala Lumpur, MALAYSIA

info@imocha.com.my

+603-22016682

Copyright © 2020 iMocha. All Rights Reserviced

QUICK LINKS

  • Home
  • About
  • News
  • Contact

Reach Us Today

29-6, The Boulevard Offices, Mid Valley City, Lingkaran Syed Putra, 59200 Kuala Lumpur, MALAYSIA

Phone: +603-22016682

E-Mail: info@imocha.com.my

Web: http://www.imocha.com.my

© 2021 VictorThemes
  • Terms and Conditions
  • Privacy Policy

Secure Channel – SSL/TLS used to encrypt communications channel
Secure Transmission – SFTP used for file transmission

PGP File Encryption – Ensures that file content can only be read by the intended recipient
Database Encryption – Protects sensitive data from being accessed by administrative-only users
Secure Data Facilities – Data stored securely with established hosting providers

Two-factor Authentication – Security token installed on user’s mobile device coupled with password access
Password Policies – Adaptable to the IT policies of each corporation
Access Control – Configurable, role-based access
Audit Trails – Eliminates data tampering concerns through traceable and accountable actions
IP Address Filtering – Additional security measure to restrict access
Digital Signatures – Monetary transactions can be traced and verified, thus avoiding repudiation of approvals
Session Timeout – Reduces exposure to risk of unauthorized access
OWASP Compliance – Protection of application from known vulnerabilities