How iSolutions Approaches Security in Payment Processing

Apr 22, 2026

When you’re working with financial data, security isn’t just important, it’s everything.

At iSolutions, security is built into every layer of every available app including iPayments, the Customer Portal, and National Accounts. From how we design our software to how we handle sensitive payment data, our approach is intentional, proactive, and continuous.

Q: How does iSolutions approach security?

Security is a foundational part of everything we do. It starts before development begins and continues throughout the entire lifecycle of our products. Before any code is written, we evaluate security across every interaction, integration, and system involved. From there, security is continuously reviewed and reinforced as features are developed, deployed, and maintained.

It’s not a one-time step, it’s an ongoing process.

Q: Where is credit card data stored?

iSolutions does not store sensitive credit card data in our system or in our client’s Business Central environments. In fact, we don’t even have visibility into full cardholder data. When a customer enters their payment information, it is transmitted securely and directly to the payment processor. The only information returned is tokenized data, which represents the payment method without exposing any sensitive details. This approach significantly reduces risk and helps protect both your business and your customers.

Q: How does PCI compliance factor into your solution?

PCI compliance is an industry standard that defines how credit card data must be handled, stored, and transmitted. We maintain PCI compliance and design our solution to reduce the compliance burden on our customers. When working with our products and integrations, businesses may be able to reduce their risk and simplify their compliance requirements.


Q: How does Microsoft’s platform impact security?

Because the iPayments solution is built within Microsoft Dynamics 365 Business Central, our customers benefit from Microsoft’s security-first approach. Microsoft prioritizes security at every level of its platform, from infrastructure to application design. This provides a strong, well-supported foundation that enhances the overall security of our solution.

Q: What does a layered security approach mean?

We use a defense-in-depth strategy, meaning security is implemented in multiple layers rather than relying on a single checkpoint. You can think of it like entering a secure building where there are multiple points where access is verified before you reach your destination. Each layer adds protection and reduces the risk of unauthorized access. We also follow the principle of least privilege, ensuring users and systems only have access to what they absolutely need. User settings, permissions, and security is all out of the box yet highly granular and configurable with Business Central.

Q: Is security only handled by the development or security team?

Security is a company-wide responsibility. Every team member plays a role in maintaining a secure environment. We conduct ongoing training across the organization to ensure everyone understands best practices, from recognizing phishing attempts to properly handling sensitive data. Security is part of our culture, not just our technology.

Q: What should businesses look for when evaluating a secure payment or AR solution?

Start by understanding your own security requirements, including any compliance or regulatory considerations. From there, when evaluating vendors, ask questions like:

  • Do you store sensitive payment data?
  • How is data encrypted in transit and at rest?
  • Who owns and controls the data?
  • How do you reduce PCI compliance burden?

At iSolutions, one of our core principles is that you always own your data. We don’t store it, and we don’t take control of it. We also do not pass information back and forth from any external systems – everything in iPayments lives directly within Business Central.

Q: How serious is iSolutions about security?

Security is a top priority across the entire organization. We take a security-first, always-on approach, continuously monitoring, improving, and strengthening our systems and processes. It’s not something we revisit occasionally; it’s embedded in how we operate every day.

Security isn’t just a feature, it’s the foundation of how iSolutions operates.

By combining a security-first development approach, a layered infrastructure, and strict data handling practices, we help businesses reduce risk, protect sensitive information, and operate with confidence. If you have additional questions about security or want to learn more about how iSolutions works within Business Central, our team is always here to help.