Enterprise Ready

Security & Compliance

We understand that trading infrastructure is mission-critical. Our security practices are designed to meet the rigorous requirements of institutional financial services clients.

Our Security Commitment

Security isn't an afterthought—it's foundational to everything we build. We apply the same rigor to our internal practices that we bring to client systems.

Data Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256). Client data never stored on local devices.

Infrastructure Security

Production systems deployed on SOC 2 compliant cloud infrastructure (AWS, GCP) with network isolation.

Access Controls

Role-based access control, multi-factor authentication required, and principle of least privilege enforced.

Audit Logging

Comprehensive audit trails for all system access and changes. Logs retained per regulatory requirements.

Personnel Security

Background checks for all staff. Security awareness training. Confidentiality agreements in place.

Incident Response

Documented incident response procedures. 24-hour notification commitment for security events.

Compliance Standards

We align our practices with industry standards and regulatory frameworks relevant to financial services.

SOC 2 Type II Aligned

Aligned

Security controls designed to meet SOC 2 Trust Service Criteria for Security, Availability, and Confidentiality.

GDPR Compliant

Compliant

Data processing practices compliant with EU General Data Protection Regulation requirements.

SEC/FINRA Aware

Aware

Understanding of regulatory requirements for broker-dealers and investment advisers.

NDA Protection

Standard

Mutual NDAs executed before any client engagement. Standard execution within 24 hours.

Insurance Coverage

Comprehensive insurance coverage to protect our clients and their interests.

Professional Liability (E&O)

$2M per occurrence

Errors and omissions coverage for professional services

Cyber Liability

$2M aggregate

Data breach, cyber extortion, and business interruption

General Liability

$1M per occurrence

Commercial general liability coverage

Vendor Assessment Support

We're prepared to support your vendor due diligence process with the following:

AIMA DDQ completion
Custom DDQ responses
Security questionnaire completion
SOC 2 controls documentation
Insurance certificates (COI)
Reference customer calls
Technical architecture review
Data handling procedures
Business continuity plan
Incident response procedures

Data Handling Practices

Client Data

  • Client production data accessed only when necessary for project delivery
  • Synthetic or anonymized data used for development and testing when possible
  • All client data deleted within 30 days of project completion unless otherwise agreed
  • No client data stored on personal devices or shared externally

Source Code & IP

  • Client-owned code stored in client-controlled repositories
  • Work product ownership clearly defined in engagement agreements
  • No proprietary client code or algorithms shared between engagements

Questions About Our Security Practices?

We're happy to discuss our security controls and provide documentation for your vendor assessment process.