Enterprise Security

Your Financial Data Security Is Our Top Priority

We handle your most sensitive financial data—variance reports, P&L statements, budget analyses. That's why we've built enterprise-grade security into every layer of our platform from day one.

Enterprise-Grade Encryption

All data encrypted in transit using TLS 1.3 and at rest using AES-256. We enforce the highest cryptographic standards across our entire infrastructure.

Isolated Data Architecture

Each customer's financial data is logically isolated with dedicated encryption keys. Your data never co-mingles with other customers' information.

AWS Bedrock AI Processing

All AI inference runs on AWS Bedrock—your data stays in your region, is never used to train models, and is deleted immediately after processing.

Zero Data Retention

We operate on a minimal data retention principle. Financial files are processed and insights are generated without persistent storage of raw data.

SOC 2 Type II In Progress

We are actively working toward SOC 2 Type II certification covering security, availability, and confidentiality.

On-Premise Deployment

Enterprise customers can deploy WealthSight on their own infrastructure for complete data sovereignty and control.

Trusted by enterprises. Compliant with global standards.

SOC 2 Type IIIn progress
GDPREU data protection
CCPACalifornia privacy
ISO 27001Information security

Organizational Security

Security at WealthSight is built on a "defense by design" principle. Every system, process, and feature is designed with security as a foundational requirement—not an afterthought.

Our dedicated security team oversees all aspects of information security, from infrastructure hardening to employee training. All team members undergo comprehensive security awareness training upon onboarding and annually thereafter.

We maintain a formal Information Security Management System (ISMS) aligned with ISO 27001 and SOC 2 frameworks (certification in progress), with executive-level oversight and regular management reviews.

Protecting Customer Data

As a financial data platform, protecting your sensitive business information is our core responsibility. We handle variance analysis data, financial statements, and business intelligence with the highest level of care.

All customer data is classified according to sensitivity levels, with financial data receiving our highest protection tier. Access to customer data is restricted to authorized personnel on a strict need-to-know basis, with all access logged and regularly audited.

Encryption Standards

Data in Transit

All data transmitted between your browser and our servers is encrypted using TLS 1.3 with strong cipher suites (AES-256-GCM, ChaCha20-Poly1305). We enforce HSTS headers and certificate pinning to prevent man-in-the-middle attacks.

Data at Rest

All stored data is encrypted using AES-256 encryption with AWS KMS-managed keys. Encryption keys are rotated automatically and stored in a segregated, hardened key management infrastructure. Database backups are also encrypted with separate key hierarchies.

Infrastructure Security

Our infrastructure runs on AWS with multi-region redundancy across US-East (Virginia) and US-West (Oregon). Production and development environments are strictly separated with independent network configurations.

We employ multiple layers of network security including Web Application Firewalls (WAF), DDoS mitigation via AWS Shield, and host-based intrusion detection systems. All server configurations follow CIS benchmark hardening guidelines.

Authentication & Access Control

We enforce the principle of least privilege across our entire organization. All production system access requires multi-factor authentication (MFA) and is granted through role-based access control (RBAC).

Access reviews are conducted quarterly, and any access to customer data is logged with full audit trails. Administrative access to production systems requires approval through our privileged access management (PAM) system.

Incident Response

We maintain a dedicated Incident Response Team with clearly defined procedures for identifying, containing, and remediating security incidents. Incidents are classified by severity, and our response protocols are tested annually through tabletop exercises and simulated breach scenarios.

In the event of a security incident affecting customer data, we commit to notifying affected customers within 72 hours via email, with regular updates until resolution. Post-incident reviews are conducted to identify root causes and prevent recurrence.

Business Continuity & Disaster Recovery

Our infrastructure is deployed across multiple AWS availability zones with automatic failover. Full daily backups are replicated to a geographically separate region, and backup restoration is tested quarterly.

Our disaster recovery plan targets a Recovery Time Objective (RTO) of 4 hours and Recovery Point Objective (RPO) of 1 hour. Business continuity procedures are documented, regularly updated, and tested annually.

Vendor Management

All third-party vendors with access to customer data undergo a security assessment before onboarding and annual reviews thereafter. Vendors are contractually required to maintain security standards consistent with our own policies.

We maintain redundancy across critical vendors and conduct regular control reviews to ensure ongoing compliance with our security requirements.

Data Privacy for AI Processing

Our AI-powered variance analysis is built with privacy at its core. Here are our commitments:

Your financial data is never used to train AI models
Data is processed in your region and deleted after analysis
Your data is never shared between customers
AI prompts, completions, and embeddings remain private to your organization
We use AWS Bedrock—fully controlled by our infrastructure, not third-party AI services
Privacy and security are built into the design, not bolted on

Penetration Testing

We engage independent, third-party security firms to conduct penetration tests at least annually. Identified vulnerabilities are remediated promptly based on severity classification. Executive summaries are available to enterprise customers upon request.

Customer Audits

We support your right to verify our security posture. Enterprise customers may conduct their own security assessments or request our latest audit reports, SOC 2 certification status, and penetration test summaries through your account representative.

Questions About Security?

Our security team is available to discuss our architecture, compliance posture, and answer any questions from your IT or security team.