HOW

WE WORK

Our culture is focused on client centricity and flexibility

1. Personal Identifiable Information

Your personal and account information are protected in our system against unauthorised access. They are always encrypted (TLS/SSL) when transmitted.

2. Stored Data Protection

Your personal information is always encrypted and stored in our secure data centers.

3. Architecture

Our system architecture allows access to your data exclusively via authenticated programmatic interfaces (API, Authentication, SSL, Certificate) as well as predetermined-only applications and servers. In addition, every access request is logged to our databases.

4. Infrastructure

We use modern IT infrastructure in order to ensure the safety of your data. Our website, servers and applications are regularly updated with the latest security technology.

5. Governance

We have policies, procedures and controls in place regarding data protection, information security, incident management and disaster recovery. These ones are reviewed and updated annually.

Resource Hub

Our resource hub is a growing collection of the best available guides, tools and articles to meet all your investment, business and financial goals.

Browse

FAQ

Have a question? Have a few? We understand. Click on the button below to find your answers

Explore

Blog

Browse our articles to find the most common questions about our funds

Discover