published 4/1/2021
Stacks Image 83


Some of these practices include:

  • End to end encryption of all data transmitted (SSL)
  • Separation of machines housing critical data from machines running front end applications
  • Strict access controls to each data piece defined by both Penny and the client
  • An audit system which records each transaction built into the core of the product
  • Physical restriction to machines is only allowed by authorized vendor, not even Penny employees can physically access them
  • Code deployment which keeps all software up to date with the latest security patches
  • Data is encrypted at rest using industry standard AES-256 encryption algorithm
  • Day Dream Technologies Inc. relies heavily on Amazon Web Services ( for most of our infrastructure. Other companies which utilize this infrastructure include FDA, Netflix, Adobe, Suncorp, Dow Jones.

We rely on a Software as a Service (SaaS) model. This means we have one centralized location for our application and can keep critical applications up to date with the latest security measures, greatly reducing the amount of time required to deploy security patches (compare to traditional on-premise solutions).

How to Contact Us

If you have questions about our security policies, please contact us via e-mail at


Be first. Create your Dreamer Profile.

new profile form icon

Creating your Dreamer Profile is simple. Sharing your email address and interest will ensure you are kept up-to-date and invited to join our early beta programs.

Learn more about how we use, share, and retain your data in our privacy policy.


To accomplish great things, we must not only act, but also dream; not only plan, but also believe.
Anatole France

© 2021 Day Dream Technologies Inc. All Rights Reserved. - Privacy - Terms - Security

We use cookies to improve your experience. By using our services, you agree to the use of our cookies such as IP address. For additional details see our privacy policy & our Terms and Conditions