How we

work

1. Personal Identifiable Information

Your personal and account information are protected in our system against unauthorised access. They are always encrypted (TLS/SSL) when transmitted.

2. Stored Data Protection

Your personal information is always encrypted and stored in our secured data centers.

3. Architecture

Our system architecture allows access to your data exclusively via authenticated programmatic interfaces (API, Authentication, SSL, Certificate) as well as predetermined-only applications and servers. In addition, every access request is logged to our databases.

4. Infrastructure

We use modern IT infrastructure in order to ensure the safety of your data. Our website, servers and applications are regularly updated with the latest security technology.

5. Governance

We have policies, procedures and controls in place regarding data protection, information security, incident management and disaster recovery. These ones are reviewed and updated annually.

Strategies

Learn more about the strategies that we offer!

EXPLORE

Responsible Investment

ESG criteria are at heart of our investment processes since 2004.

READ

Contact Us

Don't hesitate to send us an e-mail to find out more about our strategies.

NAVIGATE
Contact Us
  • Interested in learning more about our strategies?

Contact Us