Trust

A secure environment for your data

BlueVoyant clients enjoy the peace of mind that comes with trusting a world-class cybersecurity team with industry-standard security controls.

We hold ourselves to the highest standards and have implemented company policies that help ensure the security of your data.

You can learn more about our Security Program and Capabilities by contacting a representative from our team at [email protected] who can address your security questions or concerns.

Request more information regarding our InfoSec Program Overview, Policy Summaries, Recent Penetration Test Summary, and more.

 

Get in touch

Security Standards and Privacy

Keeping your data safe and secure is part of normal operations with BlueVoyant.

Our managed security services are designed and delivered with a commitment to data privacy and protection.

Our architecture is built on the principles of privacy by design.

We use technical controls to classify private information, ensuring it’s appropriately handled, encrypted, and if not needed for security operations, uningested in the first place.

SOC Type II Compliant

We meet the defined criteria for managing customer data based on the “Trust Service Principles Criteria and Illustrations.”

The American Institute of Certified Public Accountants (AICPA) evaluates an enterprise’s information systems that are relevant to security and availability. SOC 2 Type II reports on various organizational controls related to security, availability, processing integrity, confidentiality and privacy.

 

Policies and Standards

Our Functional Assessments allow you to target specific aspects of your security program. We evaluate granular areas like cloud security performance, fraud risk, security stacks and more.

  • Application Development Security

  • Asset Management Enforcement

  • Business Continuity

  • Data Security and Information Lifecycle Management

  • Encryption and Key Management

  • Identity and Access Management Policy

  • Incident Management, E-Discovery and Cloud Forensics

  • Threat and Vulnerability Management Policy

Looking for something else?

We are committed to rapid and thorough security improvements.

Learn about the Wavelength™ Client Platform System Processes and availability.
Gather information about how we collect, process, store and deliver data.
Review how we protect your information and data within BlueVoyant and with our technology partners.

Do you believe you’ve discovered an issue? Please contact us at

[email protected].

Contact us

Security Veterans

We hire experienced cyber defenders and security architects from FBI, NSA and other Intelligence agencies as well as from leading organizations throughout the private sector.

We offer them opportunities to gain additional training and certifications to maintain up-to-date skills and offer growth within the company.

Zero-Trust Architects

All internal communications are encrypted from point to point, including endpoints to applications, and inter-application communication.

We centrally manage identity and authentication for all applications and infrastructure, while all authorization is leased. All encryption keys are managed by BlueVoyant, helping to protect against data access by any third party.

About our team

We can’t secure our clients without first securing ourselves. That’s why security best-practices are non-negotiable for all BlueVoyant staff.

Thought Leaders in Security

We hire experienced candidates from leading agencies, including FBI Cyber, as well as the private sector. We offer additional training and certifications to maintain up-to-date skills and drive personal development.

Trusted and Verified

All BlueVoyant employees go through the same vetting process as leading Financial Services firms. We ensure the utmost trust in our people so our customers can rest assured they’re in good hands.

Policy Enforcement

We take a zero-trust, whitelist-only approach to protecting information. Our security policies address: asset classification, risk assessment, access control, change control and acceptance, incident response, exceptions, training, and what to do in case of a suspected incident.