Security
Safeguards at every layer.
Custody, infrastructure, and operational controls designed to keep client assets protected.
Custody
Segregated storage and allow-lists.
Controls
Role-based access and approvals.
Resilience
Dual-region infra and monitoring.
Framework
Defense-in-depth.
Segregated storage, identity and device checks, and policy-based approvals.
Custody
Segregated wallets, vendor redundancy, multi-sig enforcement, and withdrawal allow-lists.
Access
Role-based permissions, device and IP trust scoring, and step-up verification.
Monitoring
Continuous alerting, anomaly detection, and audit trails for actions and changes.
Operations
Reliability and compliance.
01
Resilience
Dual-region infrastructure, backups, and failover practices.
02
Reporting
Statements, exports, and reconciliations to support audits.
03
Policies
Withdrawal limits, approvals, and operational runbooks.