PROVIDING A SECURE ENVIRONMENT FOR YOUR DATA

BlueVoyant clients enjoy the peace of mind that comes with trusting a world-class cybersecurity team with industry-standard security controls. Protecting our clients’ information is important to us. We hold ourselves to the highest standards and have implemented company policies that help ensure the security of your data. 

You can learn more about our Security Program and Capabilities by contacting a representative from our team at contact@bluevoyant.com who can address your security questions or concerns.

Request more information regarding our InfoSec Program Overview, Policy Summaries, Recent Penetration Test Summary, and more.

EMAIL US
SOC2_Logo_Revised_3_.591b2ae4dbc8a

SECURITY STANDARDS

Keeping your data safe and secure is part of normal operations with BlueVoyant.

SOC2

BlueVoyant is SOC 2 Compliant. This means we have met the defined criteria for managing customer data based on the “Trust Service Principles Criteria and Illustrations.”


The American Institute of Certified Public Accountants (AICPA) evaluates an enterprise’s information systems that are relevant to security and availability. SOC 2 reports on various organizational controls related to security, availability, processing integrity, confidentiality and privacy. 

Policies and Standards

  • Application Development Security
  • Asset Management Enforcement
  • Business Continuity
  • Data Security and Information Lifecycle Management
  • Encryption and Key Management
  • Identity and Access Management Policy
  • Incident Management and E-Discovery and Cloud Forensics
  • Threat and Vulnerability Management Policy

Privacy

In addition to being a leader in Cybersecurity, BlueVoyant managed security services are designed and delivered with a commitment to data privacy and protection.


We are architected using the principles of privacy by design, with technical controls to classify and ensure that private information is appropriately handled, encrypted, and if not needed for security operations, uningested in the first place.

Looking for Something Else?

We are committed to rapid and thorough security improvements.

  • Learn about the Wavelength™ Client Platform System Processes and availability.
  • Gather information about how we collect, process, store and deliver data.
  • Review how we protect your information and data within BlueVoyant and with our technology partners.

Do you believe you’ve discovered an issue? Please contact us at security@bluevoyant.com. 

Quick Links:      Privacy Policy   |    Cookie Policy 

REQUEST INFO

Security Veterans

We hire experienced cyber defenders and security architects from FBI, NSA and other Intelligence agencies as well as from leading organizations throughout the private sector. 

We offer them opportunities to gain additional training and certifications to maintain up-to-date skills and offer growth within the company.

Zero-Trust Architects

BlueVoyant takes a zero-trust, whitelist-only approach to protecting information. All internal communications are encrypted from point to point, including endpoints to applications, and inter-application communication so that data is never exposed.

Identity and authentication for all applications and infrastructure is centrally managed and authorization is leased.  All encryption keys are managed by BlueVoyant, helping to protect against data access by any third party.

ABOUT OUR TEAM

Thought Leaders in Security

We hire highly experienced candidates from FBI Cyber and other agencies as well as the private sector.  We offer them opportunities to gain additional training and certifications to maintain up-to-date skills and offer growth within the company.

Trusted and Verified

All BlueVoyant employees go through the same vetting process as leading Financial Services firms. We ensure the utmost trust in our people so our customers can rest assured they’re in good hands.

Policy Enforcement

BlueVoyant takes a zero-trust, whitelist-only approach to protecting information. Our security policies address: asset classification, risk assessment, access control, change control and acceptance, incident response, exceptions, training, and what to do in case of a suspected incident.