Security & Trust

Built for institutional finance

Alterest is built for institutional workflows where outputs must be auditable and defensible. Governance isn't a feature — it's the foundation.

Trust at a glance

Security and compliance built-in

Certified

SOC 2 Type II

Annual audit of security controls and practices

Enabled

Encryption

AES-256 at rest, TLS 1.3 in transit

Supported

SSO/SAML

Enterprise identity provider integration

Always On

Audit Logs

Complete activity logging and export

Configurable

RBAC

Granular role-based access controls

Flexible

Data Residency

Choose your deployment region

Governance by design

Controls built into every operation

Not bolted on. Not optional. Every action in Alterest is governed from the start.

01

Role-based access controls

Define who can view, edit, run, and approve at every level — from deals to individual data fields.

02

Segregation of duties

Enforce separation between data entry, verification, and approval with configurable workflows.

03

Evidence capture and approvals

Every decision requires evidence. Every approval is logged with who, when, and why.

04

Versioning and change history

Track every change to data, configurations, and outputs with full audit trails.

Data lineage

From source to output

Know exactly where every number came from and how it was transformed.

01

Input tracking

Every file, every field, every value is tracked from the moment it enters the system.

02

Transformation logging

See exactly how data was normalized, calculated, and transformed at each step.

03

Check and approval chain

Follow the complete path: which checks ran, what exceptions were raised, how they were resolved.

04

Reproducible historical results

Re-run any historical verification with the same inputs to get the same outputs.

AI governance

AI assistance with full accountability

When AI helps, every input, output, and decision is logged.

01

Human-in-the-loop approvals

AI proposes, humans approve. No AI action happens without explicit human consent.

02

Logged prompts and outputs

Every AI interaction is logged: what was asked, what was provided, what was decided.

03

Policy-based controls

Define what AI agents can and cannot do at the policy level, enforced by the platform.

04

Permission inheritance

AI agents inherit the permissions of the invoking user. No elevation possible.

Operational security

Enterprise-grade infrastructure

Security controls that meet institutional requirements.

01

Encryption at rest and in transit

AES-256 encryption for data at rest, TLS 1.3 for all data in transit.

02

SSO and SAML support

Integrate with your existing identity provider for single sign-on.

03

Comprehensive audit logs

Every access, every action, every export is logged and available for review.

04

Secure deployment options

Cloud, private cloud, or on-premise deployment to meet your security requirements.

Request our security documentation

Get our SOC 2 report, security questionnaire responses, and detailed architecture documentation.