The internet browser you are using is not supported by this site. For the best experience, switch to Chrome, Firefox, Safari, or Microsoft Edge.

Skip To Content
Security

Secure by design

+SUBSCRIBE® takes a holistic approach to security: risk assessment, threat protection, and constant monitoring are built into everything we do to meet and exceed all relevant security protocols and standards to keep your data secure.

Already have an account? Sign In

  • SOC II Compliant

    Ensuring strict adherence to trust service principles. We fully understand the role of a mature and proven information security program in meeting our customer goals. We have successfully completed our SOC2-Type-II annual review.

  • Reliable Availability

    We ensure the availability of our data and processing resources. We perform regular review and testing of disaster response plans. Systems are deployed in geographically separated data centers.

  • Multi-FACTOR AUTHENTICATION

    Two-factor authentication is an extra layer of security designed to ensure that you're the only person who can access your account, even if someone knows your password.

  • Continuous Monitoring

    We're always watching - in a non-creepy kind of way. Whether through automated systems or personal interaction, we maintain a constant state of oversight to ensure our systems are secure, reliable, and available.

  • AES256 Encryption

    Everything is encrypted at rest as well as in transit. Confidential data is always encrypted, both at the client as well as server side.

  • IN-DEPTH DEFENSE AND LAYERED SECURITY

    Many tiered security. Network and Host-based firewalls. Network and sub-network isolation. Multi-factor authentication. A low attack surface

  • PENETRATION TESTS

    We conduct penetration tests periodically to deliver a secure application. Our tests monitor the already low attack surface in the most realistic way possible, and then identify weaknesses that may lead to paths of compromise.

  • Vulnerability Scans

    We run automated vulnerability scans and perform proactive patch management. In addition, we regularly perform data-driven risk assessments.

Electronic subscription document technology for alternative investments.

We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. By clicking ‘Accept’ you agree that we can share this information with third parties, such as our advertising partners. For more information, please view our cookie policy for the types of cookies we use.