Security

Safeguards at every layer.

Custody, infrastructure, and operational controls designed to keep client assets protected.

Custody

Segregated storage and allow-lists.

Controls

Role-based access and approvals.

Resilience

Dual-region infra and monitoring.

Framework

Defense-in-depth.

Segregated storage, identity and device checks, and policy-based approvals.

Custody

Segregated wallets, vendor redundancy, multi-sig enforcement, and withdrawal allow-lists.

Access

Role-based permissions, device and IP trust scoring, and step-up verification.

Monitoring

Continuous alerting, anomaly detection, and audit trails for actions and changes.

Operations

Reliability and compliance.

01
Resilience

Dual-region infrastructure, backups, and failover practices.

02
Reporting

Statements, exports, and reconciliations to support audits.

03
Policies

Withdrawal limits, approvals, and operational runbooks.