Get access to real-time banking data

Leverage the power of data to gain greater customer insight, deliver new financial services and help your customers make smarter financial decisions.

Quality account and transaction data

Get access to complete and reliable account and transaction data. Access up-to-date account details, account balances and transactions.

Sample account response Sample transaction response

Built for developers

Simple to use, RESTful, and fully documented APIs that help you integrate with your application.

Powerful SDKs

Get a head start by using our SDKs, and make your first call to our APIs within a few minutes.


Easy documentation

Easy to follow and complete documentation that explains how to authenticate and use our APIs.

Sandbox environment

We provide a fully functional sandbox environment that allows you to test the APIs before going live.

Get started for free

Getting started is easy. Be up and running in minutes.



Our approach to security is designed to protect both you and your customers. We monitor every activity, we continuously invest in security upgrades, and we protect your data like our business depends on it—because it does.

PCI / SOC 2 Compliant
Secure environment

Our physical infrastructure is hosted and managed in a ISO 27001, SOC 1 & SOC 2, PCI Level 1, FISMA Moderate and SOX certified data centre.

Multi-Factor auth
Multi-Factor authentication

Two-factor authentication and strong password controls are required for administrative access to systems.

IP restricted
Restricted network access

Firewalls are utilised to restrict access to systems from external networks and between systems internally.

At-rest encryption
Data encryption

We store data at rest using 256-bit AES encryption and use an SSL/TLS secure tunnel to transfer data between your app and our API.

Secure development practices

Our development follows industry-standard secure coding guidelines, such as those recommended by OWASP.

Secure APIs
Realtime monitoring

We conduct behavioural monitoring, vulnerability assessment, SIEM and intrusion detection to detect threats and keep our system safe and secure.