Built for institutional finance
Alterest is built for institutional workflows where outputs must be auditable and defensible. Governance isn't a feature — it's the foundation.
Trust at a glance
Security and compliance built-in
SOC 2 Type II
Annual audit of security controls and practices
Encryption
AES-256 at rest, TLS 1.3 in transit
SSO/SAML
Enterprise identity provider integration
Audit Logs
Complete activity logging and export
RBAC
Granular role-based access controls
Data Residency
Choose your deployment region
Controls built into every operation
Not bolted on. Not optional. Every action in Alterest is governed from the start.
Role-based access controls
Define who can view, edit, run, and approve at every level — from deals to individual data fields.
Segregation of duties
Enforce separation between data entry, verification, and approval with configurable workflows.
Evidence capture and approvals
Every decision requires evidence. Every approval is logged with who, when, and why.
Versioning and change history
Track every change to data, configurations, and outputs with full audit trails.
From source to output
Know exactly where every number came from and how it was transformed.
Input tracking
Every file, every field, every value is tracked from the moment it enters the system.
Transformation logging
See exactly how data was normalized, calculated, and transformed at each step.
Check and approval chain
Follow the complete path: which checks ran, what exceptions were raised, how they were resolved.
Reproducible historical results
Re-run any historical verification with the same inputs to get the same outputs.
AI assistance with full accountability
When AI helps, every input, output, and decision is logged.
Human-in-the-loop approvals
AI proposes, humans approve. No AI action happens without explicit human consent.
Logged prompts and outputs
Every AI interaction is logged: what was asked, what was provided, what was decided.
Policy-based controls
Define what AI agents can and cannot do at the policy level, enforced by the platform.
Permission inheritance
AI agents inherit the permissions of the invoking user. No elevation possible.
Enterprise-grade infrastructure
Security controls that meet institutional requirements.
Encryption at rest and in transit
AES-256 encryption for data at rest, TLS 1.3 for all data in transit.
SSO and SAML support
Integrate with your existing identity provider for single sign-on.
Comprehensive audit logs
Every access, every action, every export is logged and available for review.
Secure deployment options
Cloud, private cloud, or on-premise deployment to meet your security requirements.
Request our security documentation
Get our SOC 2 report, security questionnaire responses, and detailed architecture documentation.