• Two-Factor Authentication (2FA) plus icon minus icon
  • Two-factor authentication consists of implementing additional security measures than mereusername and password-based login credentials. We offer two options for 2FA security: The issuance of email... See more
  • Key Vault for Private Keys and Passwords plus icon minus icon
  • No sensitive information is stored in plain text files on servers hard drives. Private keys, databaseaccess passwords, API keys – all such critical pieces of data are stored inside our cloud provid... See more
  • Internal Firewalls plus icon minus icon
  • Our exchange platform is designed in a way to hide most important services deep inside the cluster. Most sensitive services such as wallet service, does not even have access to the outside world. I... See more
  • Virtual Private Network plus icon minus icon
  • All exchange personnel have to authenticate and connect to virtual private network in order to accessexchange admin services. This means that no strangers can even send a network packet to the exch... See more
  • Web Application Firewall plus icon minus icon
  • Every packet that arrives at the exchange is thoroughly inspected based on a comprehensive set ofcriteria designed to detect any type of malicious activity. For example, this inspection can detect ... See more