
Data & Confidentiality
Enterprise-Grade Security Architecture
Single-tenant infrastructure with logical/physical separation, dedicated resources, and end-to-end encryption for all data storage and transit using TLS 1.2+.
Regulatory Compliance Framework
SOC 2 Type II and ISO 27001 certifications are underway, with GDPR compliance achieved, penetration testing, and third-party audits to meet institutional fund requirements.
Secure Data Management
Secure client data ingress via third party integrations, with managed security leveraging Azure Active Directory and cloud-native controls.
Vendor Security
Navys uses a risk-based approach to vendor security. Factors which influence the inherent risk rating of a vendor include:
Access to Customer and Corporate Data
Vendors with access to sensitive client data or personal data are evaluated for data retention practices, encryption standards, and infrastructure security to ensure strict protection of confidential information.
Access to Core Infrastructure
Vendors that connect directly to production systems are assessed for access controls, change management protocols, and the ability to isolate environments to prevent accidental or malicious interference.
Potential Damage to the Navys Brand
We assess the reputational risk a vendor may pose by evaluating incident history, security certifications, and alignment with our operational and ethical standards.