3D Secure Checkout
Fraud protection that requires customers to complete an additional verification step with the card issuer when paying.
API Keys
Generate different API keys for your different integrations, with specific permissions to increase security.
Custom attributes for products
DevelopersDigital ProductsPhysical Products
Add additional information for products, beyond the standard product attributes.
Custom DPA signing
Create and sign custom data protection agreements (DPAs) with partners and customers. Enabling additional control and security for sensitive data.
Custom SMTP
Use your own email server to send emails through the platform. This is useful if you have specific security or compliance requirements.
Daily backup with hourly snapshots
Our backups are always up-to-date and protects against potential data losses due to malfunction, user errors or malicious attacks.
Detailed audit log
A comprehensive record of events, activities, and changes in the system is invaluable when trying to determine the cause of an incident or problem.
Developer log browser
View and search through the API logs for easy troubleshooting of issues and debug of applications.
Event log monitoring
White-labelManagementDevelopers+2
Stay on top of every event and decide when to get notified. The easy-to-read format makes troubleshooting faster. Developers gets extra information in a JSON format for easy integration.
Fully GDPR Compliant
Ensure full compliance with GDPR regulations to protect customer data and privacy across all operations.
High-Availability with auto failover
Ensures that a system or application remains available and fully operational by automatically switching to a backup if the primary system fails, providing a high level of availability and minimal downtime.
High-quality API documentation
Our clear and detailed instructions makes it easy to integrate your other systems with our platform.
Hosted on a distributed and sandboxed cloud
Enjoy maximum performance while your data and resources are protected and isolated in a virtual environment to minimize the risk of downtime or data breaches.
In-store pickup
In-store pickup allows customers to order products online and pick them up at a physical store.
Multi-factor authentication
Choose between Two-Factor or Multi-Factor login depending on your preference. The login methods are password, fingerprint, yubikey, authenticator app, facebook or code via email/sms. You can also login from another device.
No cookie notification approval needed
There is no need to display an annoying pop-up box for cookies consent to the users as all the necessary software and tracking are already built into Tamio
Permissions for API Keys
Set specific permissions for each API key to control which actions can be performed. This helps to ensure that only authorized users can access certain features or data.
PSD2 Compliant
PSD2 is an EU Directive designed to increase security and protect consumers when making online payments in the European Economic Area.
SCA Ready
SCA ready means compliance with the Strong Customer Authentication regulation for added security to fraudulent activity with online payments made in the European Economic Area.
SSL everywhere. Get HTTPS
SSL encryption helps protect customers' information by preventing data interception and increasing trust with the HTTPS protocol and a padlock icon.
Store hours (Sell only when open)
Site BuilderPhysical store
Set specific times when the online store will be open for sales. This is needed for businesses like restaurants to match in-person store hours and to make sure customers can be serviced.
Target/Limit purchase to geolocation
Limit the availability of products to specific geographic locations. This is useful to tailor offerings to specific markets or to comply with legal restrictions.
Transactions API Javascript SDK
This allows developers to integrate transaction capabilities into their web or mobile application using JavaScript.
Webhook signing & signature verification service
Securely transmit data and verify authenticity by signing webhook payloads and verifying signatures before processing incoming webhooks.