Security & Compliance
We understand that trading infrastructure is mission-critical. Our security practices are designed to meet the rigorous requirements of institutional financial services clients.
Our Security Commitment
Security isn't an afterthought—it's foundational to everything we build. We apply the same rigor to our internal practices that we bring to client systems.
Data Encryption
All data encrypted in transit (TLS 1.3) and at rest (AES-256). Client data never stored on local devices.
Infrastructure Security
Production systems deployed on SOC 2 compliant cloud infrastructure (AWS, GCP) with network isolation.
Access Controls
Role-based access control, multi-factor authentication required, and principle of least privilege enforced.
Audit Logging
Comprehensive audit trails for all system access and changes. Logs retained per regulatory requirements.
Personnel Security
Background checks for all staff. Security awareness training. Confidentiality agreements in place.
Incident Response
Documented incident response procedures. 24-hour notification commitment for security events.
Compliance Standards
We align our practices with industry standards and regulatory frameworks relevant to financial services.
SOC 2 Type II Aligned
AlignedSecurity controls designed to meet SOC 2 Trust Service Criteria for Security, Availability, and Confidentiality.
GDPR Compliant
CompliantData processing practices compliant with EU General Data Protection Regulation requirements.
SEC/FINRA Aware
AwareUnderstanding of regulatory requirements for broker-dealers and investment advisers.
NDA Protection
StandardMutual NDAs executed before any client engagement. Standard execution within 24 hours.
Insurance Coverage
Comprehensive insurance coverage to protect our clients and their interests.
Professional Liability (E&O)
$2M per occurrence
Errors and omissions coverage for professional services
Cyber Liability
$2M aggregate
Data breach, cyber extortion, and business interruption
General Liability
$1M per occurrence
Commercial general liability coverage
Vendor Assessment Support
We're prepared to support your vendor due diligence process with the following:
Data Handling Practices
Client Data
- Client production data accessed only when necessary for project delivery
- Synthetic or anonymized data used for development and testing when possible
- All client data deleted within 30 days of project completion unless otherwise agreed
- No client data stored on personal devices or shared externally
Source Code & IP
- Client-owned code stored in client-controlled repositories
- Work product ownership clearly defined in engagement agreements
- No proprietary client code or algorithms shared between engagements
Questions About Our Security Practices?
We're happy to discuss our security controls and provide documentation for your vendor assessment process.