Security at Western Alliance Bank Business is layered across encryption, authentication, authorization, transaction monitoring, and regulatory compliance. Every business banking portal session runs over 256-bit TLS encryption. Every login requires multi-factor authentication through the mobile app, SMS, email, or RSA SecurID token. Every qualifying payment requires dual authorization from two different users. Positive pay compares presented checks and ACH debits against issued files to block fraudulent items before they post.
This page documents the technical controls, administrative policies, and federal compliance obligations that protect corporate treasury accounts at Western Alliance Bank Business. Treasury teams, CFOs, and IT security officers should use this as a reference when completing vendor risk assessments, third-party due diligence questionnaires, and internal audit reviews of banking relationships.
Business Login Guide Security Help
Western Alliance Bank Business runs a defense-in-depth program. No single control protects treasury operations alone; each layer catches what earlier layers might miss.
TLS 1.2 and TLS 1.3 protect every session between the client and the business banking portal. Certificate pinning on mobile apps resists man-in-the-middle attacks on untrusted Wi-Fi. AES-256 encrypts data at rest across databases, backup archives, and disaster-recovery replicas. Key management uses hardware security modules with key rotation on a documented schedule.
Company ID plus user ID plus password forms the primary credential triple. Multi-factor authentication is required for every login through mobile push notifications, SMS, email codes, biometric verification, or RSA SecurID hardware tokens. Session cookies expire at end of banking day. Password policies enforce minimum 12 characters with complexity requirements and annual rotation on privileged admin roles.
Role-based access controls limit each user to the functions relevant to their job. Dual authorization requires two independent users to release qualifying payments. Transaction limits cap single-user payment authority by payment type, counterparty status (new versus established), and daily aggregate amount. IP whitelisting restricts portal access to known corporate networks. Audit logs capture every action with user, timestamp, source IP, and outcome.
Every commercial banking session passes through multiple control layers before any payment releases from corporate accounts.
| Layer | Control | Purpose | Scope |
|---|---|---|---|
| Network | TLS 256-bit encryption | Session-in-transit protection | All browser and mobile sessions |
| Network | Certificate pinning | Man-in-the-middle resistance | Mobile apps only |
| Storage | AES-256 at rest | Data-at-rest protection | Databases, backups, replicas |
| Identity | Multi-factor authentication | Credential compromise defense | Every login, every user |
| Identity | RSA SecurID tokens | Hardware-based second factor | Privileged admin and high-value roles |
| Identity | Biometric mobile login | Face ID, Touch ID, fingerprint | Mobile app post-enrollment |
| Authorization | Dual authorization | Two-person payment release | Wires, ACH, internal transfers above threshold |
| Authorization | Role-based access control | Least-privilege enforcement | Every portal function |
| Authorization | IP whitelisting | Network-based restriction | Corporate treasury networks |
| Fraud prevention | Positive pay | Check and ACH fraud blocking | Issued files vs. presented items |
| Monitoring | BSA/AML transaction monitoring | Unusual activity detection | All accounts, all payments |
| Monitoring | OFAC sanctions screening | Sanctioned entity blocking | Every outbound payment, new customers |
| Attestation | SOC 2 Type II audit | Independent control verification | Annual, externally audited |
Every business banking login enforces multiple factors. Credentials alone — even correct ones — never authenticate a session.
The first authentication step collects three credentials: a company-level identifier unique to the organization, a per-user identifier unique to each named operator, and a user-chosen password meeting complexity requirements. The company ID creates a namespace boundary so that a compromised user ID and password from one company cannot be tried against a different company's accounts. Password policies enforce minimum length, character complexity, annual rotation for admin roles, and password-reuse prevention. The login guide walks through credential setup for new users added by company administrators.
After the primary credentials, Western Alliance Bank Business presents a second-factor challenge. Options include push notification through the mobile app (approve on phone with biometric), SMS one-time code, email one-time code, or an RSA SecurID hardware token generating a time-based one-time password. Privileged admin roles and high-value approvers typically use RSA SecurID to avoid SIM-swap and SMS interception risks. Biometric login on the mobile app replaces password entry after initial enrollment — Face ID, Touch ID, and Android fingerprint are supported with the secure enclave holding the authentication secret.
Authorization controls prevent compromised credentials or insider threat from releasing fraudulent payments.
Dual authorization requires two independent users to release qualifying payments. One operator prepares the wire, ACH batch, internal transfer, or bill payment; a second operator with approval authority reviews the pending item and releases it. The two users must have separate credentials, separate RSA SecurID tokens, and typically operate on separate workstations. Corporate treasury organizations configure dual authorization thresholds — a common setup uses $10,000 as the trigger with lower limits (or zero limits) for new payees who have not been verified through a separate out-of-band confirmation.
Positive pay compares every presented item against an issued file loaded by the corporate treasury team. Matching items clear automatically; non-matching items flag to the treasury exception queue. The exception window typically closes at 10:00 AM local time; unconfirmed items return to the presenter. Payee positive pay extends the match to include the payee name printed on check face. ACH positive pay (sometimes called ACH Block or ACH Filter) applies the same concept to electronic debits, filtering presented ACH debits against a list of pre-authorized originators and blocking unauthorized debit attempts before they post against the account.
Federal commercial banking regulation sets baseline security requirements and Western Alliance Bank Business exceeds them through layered internal controls.
Bank Secrecy Act and Anti-Money-Laundering compliance covers every deposit account and payment transaction. Know Your Customer reviews confirm beneficial ownership on new accounts. Enhanced Due Diligence applies to higher-risk industries. Transaction monitoring flags unusual activity for investigator review. Currency Transaction Reports and Suspicious Activity Reports are filed as warranted. See Federal Reserve guidance for program standards.
Every outbound wire recipient, ACH beneficiary, and new customer gets screened against sanctions lists published by the US Treasury Office of Foreign Assets Control. Matches generate holds pending compliance review. The OCC examines OFAC compliance as part of safety and soundness reviews, and sanctions violations carry severe financial and reputational consequences.
Independent auditors conduct annual SOC 2 Type II examinations covering the security, availability, and confidentiality trust service criteria. The resulting SOC 2 report is available to enterprise clients under non-disclosure agreement for inclusion in vendor risk assessments. FDIC examinations separately review information-security program adequacy.
For SOC 2 reports, vendor risk documentation, penetration test summaries, or detailed security architecture questions, reach the treasury management team at +1-800-444-7441. Enterprise clients receive dedicated relationship managers who coordinate security documentation requests with the bank's information-security team. Third-party due diligence questionnaires are supported for qualifying clients. Response turnaround on standard questionnaires is typically 5-10 business days through relationship managers.
Contact Treasury Help CentreCommon questions about encryption, authentication, authorization, fraud prevention, and regulatory compliance.
256-bit TLS for every session (TLS 1.2 and 1.3). AES-256 at rest across databases, backups, and replicas. Certificate pinning on mobile apps. See the login guide for session security details and help centre for browser requirements.
Every login requires a second factor after company ID, user ID, and password. Options include mobile push, SMS, email, biometric (Face ID, Touch ID, fingerprint), or RSA SecurID hardware token. Session cookies expire at end of banking day. See login guide.
Dual authorization requires two independent users to release qualifying payments. One prepares, one approves. Default threshold $10,000 with configurable per-company limits. Applies to wires, ACH batches, internal transfers. See payment solutions.
Positive pay matches presented checks and ACH debits against issued files. Matching items clear automatically, non-matching items flag for exception review before 10:00 AM local. Unauthorized items return before posting. Payee positive pay extends matching to include payee name.
Yes. BSA/AML covers every account and transaction with KYC, Enhanced Due Diligence, and transaction monitoring. OFAC screens every outbound payment and new customer against Treasury sanctions lists. See Federal Reserve program guidance.