Enterprise-Grade Security

Fintool implements rigorous security measures to protect your sensitive data, ensuring compliance with the highest standards of data protection and privacy.

Data Hosting Locations Flexible hosting options with enterprise-grade security across multiple regions.

US Data Centers

Default hosting location with highest performance.

U.S Compliant

Custom Regions

Optional hosting in EU, APAC, or other supported regions.

European Compliant

Enterprise Data Residency Controls

Region Selection

Self-service region selection via Enterprise contract

Vendor Restriction

Most vendors restricted to US-only processing

Compliance Guarantee

Automatic compliance with local regulations

No Foundation Model Training Your data is never used by OpenAI to train or improve their AI models

Zero Data Storage

All data is deleted immediately after processing and is never stored on OpenAI servers.

No training or fine-tuning on user data

OpenAI Security

OpenAI implements strict security measures to protect your sensitive data and does not share data with third parties.

CCPA, GDPR, HIPAA, SOC 2 compliant

OpenAI Data Privacy Guarantees

Enterprise-grade encryption

AES-256 at rest, TLS 1.2+ in transit

No data selling or sharing

OpenAI does not sell user data or share it with third parties for marketing purposes

Strict access controls

OpenAI uses strict access controls to limit who can access data

No training on user queries

No Fintool user questions are used for OpenAI's training, fine-tuning, or model improvements

Private Data Ingestion Controls Secure integration with your internal systems like SharePoint, Onedrive, Google Drive, etc with granular access controls

Content Control

Control exactly what data Fintool crawls and indexes within your systems.

Prevent indexing of sensitive content

Search Term Restrictions

Prevent Fintool from surfacing results for certain sensitive search terms.

Customizable blocklists for terms

Strict Permissions Enforcement

Permission-aware results

Fintool only shows you information you already have permission to access in the source application

Real-time permission updates

If any permissions change in your systems, Fintool's results reflect those changes immediately

Role-based access control

Comprehensive RBAC system integrates with your existing identity providers

Audit logging

Detailed logs of all access attempts and permission changes

Strict Permissions Enforcement Granular access controls ensuring users only see what they're authorized to access

Role-Based Access

Fintool only shows information you already have permission to access.

Permission-aware search results

Real-time Permission Updates

If any permissions change, results reflect those changes immediately.

Continuous permission syncing

Enterprise Permission Features

Native integration with identity providers

Seamlessly works with Okta, Azure AD, Google Workspace, and other IDPs

Access inheritance from source systems

Automatically inherits permissions from SharePoint, Google Drive, and other data sources

Group-based access controls

Manage access via existing security groups rather than individual users

Permission visibility and reporting

Comprehensive dashboards to audit who has access to what information

Comprehensive Audit Trails Detailed tracking and monitoring of all user interactions within the platform

Time-Stamped Activity Logs

Detailed tracking of all user activities with precise timestamps.

Full visibility into platform usage

SIEM Integration

Export audit logs to your SIEM for monitoring and real-time alerting.

Integration with existing systems

Tracked User Activities

Query Tracking

Log of all user questions and interactions with the AI assistant

Document Access

Record of all document uploads and equity research report views

Administrative Actions

Complete logs of all configuration changes and user management activities

Export Capabilities

Configurable audit log exports in multiple formats for compliance reporting

TimestampUserActivityResource
2023-06-14 09:23:45[email protected]Query"Q1 financial performance"
2023-06-14 10:15:32[email protected]Document UploadQ2_Forecast.pdf
2023-06-14 11:42:18[email protected]Report ViewTesla Equity Research
2023-06-14 14:05:59[email protected]User Added[email protected]

Encryption of All Data Enterprise-grade encryption standards protecting your sensitive information

Encryption at Rest

All data is encrypted at rest using AES-256 encryption standards.

Military-grade protection

Encryption in Transit

All data is encrypted in transit using TLS 1.2+ protocols.

Secure data transmission

Data Protection Controls

Key Management System

Secure key management with automatic rotation and revocation capabilities

Data Exfiltration Prevention

Controls in place to limit data exfiltration risks

Hardware Security Modules

FIPS 140-2 certified HSMs for cryptographic operations

Secure VPC Architecture

Network isolation with strict access controls

Insurance Policies Comprehensive coverage to protect against various risks.

Commercial Crime Insurance

Coverage Includes:

  • Employee Theft (your property and client property)
  • Computer Fraud & Funds Transfer Fraud
  • Theft Inside or Outside Premises
  • Forgery or Alteration
  • Money Order & Currency Fraud
  • Investigation Costs (sublimit: $50,000)

Protects from losses due to dishonest acts, fraud, theft, or forgery by employees or third parties.

Technology E&O / Cyber Liability

Coverage Includes:

  • Tech E&O and Media Errors & Omissions
  • Network Security & Privacy Liability
  • Breach Response and Forensics
  • Payment Card Industry Penalties
  • System Damage Recovery
  • Telecom Fraud (e.g., cryptojacking)
  • Cyber Extortion / Ransomware
  • Business Interruption (from cyber incidents)

Need More Information?

If you have any questions about our security practices or need additional information, our team is ready to help.