Security
WhosOn is the live chat software you can trust. We’re leaders in chat security, and we pull out every stop to make sure your data stays protected. So, how do we keep your chat data safe?
The software
Any chat session powered by WhosOn is established via a secure connection.
Your live chat conversations are protected at every possible touchpoint.
Brute-force attacks won’t work against WhosOn.
WhosOn comes with added security to detect and protect sensitive data.
Run a tight ship by fine-tuning access rights and permissions to WhosOn.
WhosOn makes it easy for even highly regulated industries to comply with regulations.

Secure connections
All connections are secured over an initial 2048-bit RSA exchange followed by an exchange of, at minimum, a 128-bit session key, produced through an SHA-256 certificate.
This uses a trusted public certificate authority, to ensure the authenticity of the Parker Software application server. Plus, all requested connections are monitored and filtered by our firewalls.

Encryption
Both the connection between the visitor and the server, and the client and the server are encrypted. So, the content of your chat messages is encrypted in transit between the two points.
The visitor to server uses HTTPS, while the client to server connection uses a customised encryption methodology.

Intrusion prevention
WhosOn will automatically blacklist IP addresses that fail to authenticate repeatedly. After 10 unsuccessful login attempts, WhosOn dynamically blocks the offending IP address.
Access to WhosOn from the blocked IP can only be resumed via direct contact with our in-house technicians.

Credit card masking
WhosOn uses secure PCI/PII masking. If enabled, it runs a pre-storage database procedure against each line of text sent to detect credit card number patterns.
This then allows masking where PII data is detected, or triggered warnings based on your settings. Plus, the sensitive data is masked both inside the chat session and inside the transcript.

User management
Each WhosOn user account has a unique username and password, with customisable access rights and permission levels to match the user’s role or requirement.
For heightened security, you can also create user rules at a granular level, adding login restrictions or disabling specific functionalities.

Compliance
Software, in itself, cannot be GDPR compliant. Companies and processes can. So, we can work with you to ensure that your use of WhosOn is fully compliant.
We have a team of in-house security experts whose GDPR knowledge is second to none. Plus, from our own internal perspective, Parker Software has rigorous GDPR measures in place.