Enterprise-Grade Security

    Fintool implements rigorous security measures to protect your sensitive data, ensuring compliance with the highest standards of data protection and privacy.

    Data Hosting Locations Flexible hosting options with enterprise-grade security across multiple regions.

    US Data Centers

    Default hosting location with highest performance.

    U.S Compliant

    Custom Regions

    Optional hosting in EU, APAC, or other supported regions.

    European Compliant

    Enterprise Data Residency Controls

    Region Selection

    Self-service region selection via Enterprise contract

    Vendor Restriction

    Most vendors restricted to US-only processing

    Compliance Guarantee

    Automatic compliance with local regulations

    No Foundation Model Training Your data is never used by OpenAI to train or improve their AI models

    Zero Data Storage

    All data is deleted immediately after processing and is never stored on OpenAI servers.

    No training or fine-tuning on user data

    OpenAI Security

    OpenAI implements strict security measures to protect your sensitive data and does not share data with third parties.

    CCPA, GDPR, HIPAA, SOC 2 compliant

    OpenAI Data Privacy Guarantees

    Enterprise-grade encryption

    AES-256 at rest, TLS 1.2+ in transit

    No data selling or sharing

    OpenAI does not sell user data or share it with third parties for marketing purposes

    Strict access controls

    OpenAI uses strict access controls to limit who can access data

    No training on user queries

    No Fintool user questions are used for OpenAI's training, fine-tuning, or model improvements

    Private Data Ingestion Controls Secure integration with your internal systems like SharePoint, Onedrive, Google Drive, etc with granular access controls

    Content Control

    Control exactly what data Fintool crawls and indexes within your systems.

    Prevent indexing of sensitive content

    Search Term Restrictions

    Prevent Fintool from surfacing results for certain sensitive search terms.

    Customizable blocklists for terms

    Strict Permissions Enforcement

    Permission-aware results

    Fintool only shows you information you already have permission to access in the source application

    Real-time permission updates

    If any permissions change in your systems, Fintool's results reflect those changes immediately

    Role-based access control

    Comprehensive RBAC system integrates with your existing identity providers

    Audit logging

    Detailed logs of all access attempts and permission changes

    Strict Permissions Enforcement Granular access controls ensuring users only see what they're authorized to access

    Role-Based Access

    Fintool only shows information you already have permission to access.

    Permission-aware search results

    Real-time Permission Updates

    If any permissions change, results reflect those changes immediately.

    Continuous permission syncing

    Enterprise Permission Features

    Native integration with identity providers

    Seamlessly works with Okta, Azure AD, Google Workspace, and other IDPs

    Access inheritance from source systems

    Automatically inherits permissions from SharePoint, Google Drive, and other data sources

    Group-based access controls

    Manage access via existing security groups rather than individual users

    Permission visibility and reporting

    Comprehensive dashboards to audit who has access to what information

    Comprehensive Audit Trails Detailed tracking and monitoring of all user interactions within the platform

    Time-Stamped Activity Logs

    Detailed tracking of all user activities with precise timestamps.

    Full visibility into platform usage

    SIEM Integration

    Export audit logs to your SIEM for monitoring and real-time alerting.

    Integration with existing systems

    Tracked User Activities

    Query Tracking

    Log of all user questions and interactions with the AI assistant

    Document Access

    Record of all document uploads and equity research report views

    Administrative Actions

    Complete logs of all configuration changes and user management activities

    Export Capabilities

    Configurable audit log exports in multiple formats for compliance reporting

    TimestampUserActivityResource
    2023-06-14 09:23:45john.smith@berkshire.comQuery"Q1 financial performance"
    2023-06-14 10:15:32sarah.jones@berkshire.comDocument UploadQ2_Forecast.pdf
    2023-06-14 11:42:18david.miller@berkshire.comReport ViewTesla Equity Research
    2023-06-14 14:05:59admin@berkshire.comUser Addednew.user@berkshire.com

    Encryption of All Data Enterprise-grade encryption standards protecting your sensitive information

    Encryption at Rest

    All data is encrypted at rest using AES-256 encryption standards.

    Military-grade protection

    Encryption in Transit

    All data is encrypted in transit using TLS 1.2+ protocols.

    Secure data transmission

    Data Protection Controls

    Key Management System

    Secure key management with automatic rotation and revocation capabilities

    Data Exfiltration Prevention

    Controls in place to limit data exfiltration risks

    Hardware Security Modules

    FIPS 140-2 certified HSMs for cryptographic operations

    Secure VPC Architecture

    Network isolation with strict access controls

    Insurance Policies Comprehensive coverage to protect against various risks.

    Commercial Crime Insurance

    Coverage Includes:

    • Employee Theft (your property and client property)
    • Computer Fraud & Funds Transfer Fraud
    • Theft Inside or Outside Premises
    • Forgery or Alteration
    • Money Order & Currency Fraud
    • Investigation Costs (sublimit: $50,000)

    Protects from losses due to dishonest acts, fraud, theft, or forgery by employees or third parties.

    Technology E&O / Cyber Liability

    Coverage Includes:

    • Tech E&O and Media Errors & Omissions
    • Network Security & Privacy Liability
    • Breach Response and Forensics
    • Payment Card Industry Penalties
    • System Damage Recovery
    • Telecom Fraud (e.g., cryptojacking)
    • Cyber Extortion / Ransomware
    • Business Interruption (from cyber incidents)

    Need More Information?

    If you have any questions about our security practices or need additional information, our team is ready to help.