TransfersContinuation VehiclesCarry Management
TransfersContinuation VehiclesCarry ManagementNewsCareersSecurityLogin
Navys
ContactLogin
TransfersContinuation VehiclesCarry Management
TransfersContinuation VehiclesCarry ManagementNewsCareersSecurityLogin

Built for the future of private markets

Subscribe to our newsletter for platform updates.

Platform

  • Features
  • Security
  • Questions

Company

  • News
  • Changelog
  • Careers
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
© 2026 Navys Technologies Limited
SECURITY

Institutional-grade
security and controls

Built with institutional-grade security and confidentiality at the core, ensuring your most sensitive fund operations are protected at every layer.

Visit our Trust Center

SOC 2 Type II

Details
ISO

ISO 27001

Details

GDPR

Details

Data & Confidentiality

Enterprise-grade infrastructure with legal-grade confidentiality designed specifically for private fund operations.

Enterprise-Grade Security Architecture

Secure Cloud Infrastructure with strict logical/physical resource and data segregation, RBAC/ABAC/ReBAC, TLS 1.2 encryption, and enterprise-grade WAF, vNET, and private endpoints.

Legal-Grade Confidentiality

Built by lawyers with confidentiality obligations at the core, ensuring strict segregation of client environments and no cross-client data exposure or model training on sensitive fund information.

Regulatory Compliance Framework

SOC 2 Type II, ISO 27001, and GDPR compliant, with penetration testing and third-party audits to meet institutional fund requirements.

Unified Data Protection

Secure third-party integrations powered by Azure Entra identity management.

Vendor Security

Navys uses a risk-based approach to vendor security. Factors which influence the inherent risk rating of a vendor include:

Access to Customer and Corporate Data

Vendors with access to sensitive client data or personal data are evaluated for data retention practices, encryption standards, and infrastructure security to ensure strict protection of confidential information.

Access to Core Infrastructure

Vendors that connect directly to production systems are assessed for access controls, change management protocols, and the ability to isolate environments to prevent accidental or malicious interference.

Potential Damage to the Navys Brand

We assess the reputational risk a vendor may pose by evaluating incident history, security certifications, and alignment with our operational and ethical standards.

Data Retention and Deletion Practices

Vendors are evaluated on how they retain and securely delete data in accordance with predefined limits, the principles of GDPR and storage limitations.

Reliability

Built for resilience and continuous operation with comprehensive monitoring, fault tolerance, and incident response protocols.

Real-Time Monitoring and Transparency

We provide real-time updates on system health, uptime, and service availability through our public status page. Real-time monitoring alerts our team to any issues immediately, ensuring rapid response and full transparency for our users.

Integration with Production Environments

Reliability is built into every layer of our integration process, with strict deployment controls, rollback mechanisms, and continuous validation to guarantee production stability. Each release is carefully staged and monitored.

System Resilience and Uptime

Our infrastructure is built for fault tolerance, real-time monitoring, and regional redundancy to maintain uptime, absorb disruptions, and deliver uninterrupted service across all environments.

Operational Continuity and Incident Response

We maintain detailed incident response protocols and business continuity plans to minimise downtime, ensure rapid recovery, and keep critical services running even in the face of unexpected disruptions.

Questions about security?

Our team is available to discuss our security architecture, compliance certifications, and data protection measures in detail.

Contact Security Team