Abstract technology pattern representing security infrastructure and data protection

Security & Compliance

A systematic approach to protection, risk management, and regulatory alignment

Security and compliance are not separate initiatives—they are foundational to how we operate. Every portfolio company benefits from group-level expertise, standardized controls, and continuous monitoring.

Security Controls

Our security posture is built on multiple layers of protection:

Encryption

Data encryption at rest and in transit using industry-standard protocols. All sensitive information is encrypted before storage.

Access Control

Role-based access management, multi-factor authentication, and principle of least privilege across all systems.

Monitoring

Continuous system monitoring, anomaly detection, and real-time alerting for suspicious activities.

Incident Response

Documented procedures for security incident identification, containment, remediation, and post-incident analysis.

Risk Management

We maintain a structured approach to identifying and mitigating operational risks:

Vendor Oversight

Thorough due diligence on all third-party service providers with ongoing performance and security assessments.

Internal Controls

Segregation of duties, approval workflows, and regular internal audits to ensure operational integrity.

Operational Resilience

Business continuity planning, disaster recovery procedures, and redundant systems to ensure service availability.

Compliance Approach

Our compliance framework is designed to align with industry best practices:

KYC/AML Alignment

Customer identification procedures and transaction monitoring aligned with anti-money laundering principles, implemented according to the requirements of our operational context.

Regulatory Awareness

Ongoing monitoring of regulatory developments in digital asset markets and proactive adjustments to our operational approach.

Policy Framework

Comprehensive internal policies covering data handling, security practices, and operational procedures.

Privacy & Data Handling

We treat user data with respect and care:

Data Minimization

We collect only the information necessary for providing services and meeting our operational requirements.

Retention Policies

Clear data retention schedules and secure disposal procedures for information no longer needed.

User Rights

Processes for users to access, correct, or request deletion of their personal information where applicable.