We only partner with regulated entities and leading technology companies to ensure we’re constantly reviewing and enhancing our processes and systems to ensure that we remain secure.

Get Started

Regulated Partners

RBK Payments Limited is a company registered in London England (Registration No.15172310). Registered office: 167-169 Great Portland Street, London England, W1W 5PF. Payment and banking services are provided by authorised payment institution

Payment Services of RBK Payments Limited are provided by Equals Connect Limited, registered in England and Wales (registered no. 07131446). Registered Office: Vintners’ Place, 68 Upper Thames St, London, EC4V 3BJ. Equals Connect Limited are authorised by the Financial Conduct Authority to provide payment services (FRN: 671508).

Payment Services of RBK Payments Limited are provided by Sciopay Ltd.Sciopay Ltd. Sciopay Ltd is a company incorporated in England & Wales. Registration No: 12352935. Sciopay Ltd is licensed and regulated by HMRC as a Money Service Business (MSB). License No: XCML00000151326. Sciopay Ltd is authorised by the Financial Conduct Authority as an Authorised Payment Institution. Firm Reference Number: 927951.

Why Our Clients Are Comfortable

RBK Payments Limited and their payments providers process over $1bn a month on behalf of thousands of individuals and companies.

Safeguarded Bank Accounts

Your money is held in separate accounts with tier one banks. In the unlikely event of RBK Payments Limited or their payment providers ceasing to exist, your money remains protected.


We comply with best practices and regulations pertaining to the management of personal data under the UK Data Protection Act (DPA), as well as the European Union General Data Protection Regulation (GDPR).


All network traffic is encrypted at a transport level and confidential information is encrypted at rest. We use best practices in terms of encryption key storage and security.

Strong Access Control

Payments platforms provide a role-based, hierarchical security model with two-step authentication and multi-factor authentication for sensitive systems. All access is logged and audited for suspicious behaviour.