Overview

Advanced Security Comes Standard

Advanced Security Comes Standard

Advanced Security Comes Standard

The security of our clients' data is our top priority. Our platform is built on modern, security-first infrastructure with advanced data privacy measures — and independently audited and certified to meet rigorous standards for security, confidentiality, and service availability.

Real-Time Security Posture

Status: All Controls Operational

Status: All Controls Operational

Status: All Controls Operational

Continuous Monitoring
Continuous Monitoring

Automated checks validate the ongoing posture of security, availability, and confidentiality controls. Exceptions trigger on-call escalation.

Automated checks validate the ongoing posture of security, availability, and confidentiality controls. Exceptions trigger on-call escalation.

Automated checks validate the ongoing posture of security, availability, and confidentiality controls. Exceptions trigger on-call escalation.

Independent Assurance
Independent Assurance

Current SOC 2 Type II and Type I reports and third-party penetration test results are available in the Trust Center.

Current SOC 2 Type II and Type I reports and third-party penetration test results are available in the Trust Center.

Current SOC 2 Type II and Type I reports and third-party penetration test results are available in the Trust Center.

Compliance

Certified to Meet Rigorous Compliance Standards

SOC 2 Type I
SOC 2 Type I
SOC 2 Type I

Controls for security, availability, and confidentiality validated by independent audit.

Controls for security, availability, and confidentiality validated by independent audit.

SOC 2 Type II
SOC 2 Type II
SOC 2 Type II

Ongoing effectiveness of security, availability, and confidentiality controls validated by independent audit.

Independent Pentests
Independent Pentests
Independent Pentests

External penetration testing performed annually. Executive summary available upon request via our Trust Center.

Platform

Best-In-Class Security
and Data Privacy Measures

Zero-Trust Access
Zero-Trust Access
Zero-Trust Access

Short-lived tokens, device attestation, and least-privilege policies enforced for every request.

Short-lived tokens, device attestation, and least-privilege policies enforced for every request.

Short-lived tokens, device attestation, and least-privilege policies enforced for every request.

Strong Authentication and MFA
Strong Authentication and MFA
Strong Authentication and MFA

MFA, conditional access, and session tokens bound to device fingerprints.

MFA, conditional access, and session tokens bound to device fingerprints.

MFA, conditional access, and session tokens bound to device fingerprints.

Granular Access Control
Granular Access Control
Granular Access Control

Fine-grained RBAC with enforced separation of duties and full audit logs.

Fine-grained RBAC with enforced separation of duties and full audit logs.

Fine-grained RBAC with enforced separation of duties and full audit logs.

Defense-in-Depth

Defense-in-Depth


Defense-in-Depth

Network segmentation, WAF, IDS, and container hardening create overlapping protection from edge to workload.

Network segmentation, WAF, IDS, and container hardening create overlapping protection from edge to workload.

Network segmentation, WAF, IDS, and container hardening create overlapping protection from edge to workload.

Hardened Infrastructure

Hardened Infrastructure


Hardened Infrastructure

Services run in hardened AWS environments, provisioned by IaC. All storage is AES-256 and KMS-encrypted.

Services run in hardened AWS environments, provisioned by IaC. All storage is AES-256 and KMS-encrypted.

Services run in hardened AWS environments, provisioned by IaC. All storage is AES-256 and KMS-encrypted.

Continuous Vulnerability Management
Vulnerability Management
Continuous Vulnerability Management

Automated dependency scans, code analysis, and CVE sweeps provide advanced threat detection.


Automated dependency scans, code analysis, and CVE sweeps provide advanced threat detection.

Automated dependency scans, code analysis, and CVE sweeps provide advanced threat detection.

Data Encryption
Defense-in-Depth


Data Encryption

TLS 1.3 in transit; AES-256 at rest with keys managed and rotated via AWS KMS.

TLS 1.3 in transit; AES-256 at rest with keys managed and rotated via AWS KMS.

TLS 1.3 in transit; AES-256 at rest with keys managed and rotated via AWS KMS.

Ironclad Data Privacy
Hardened Infrastructure


Ironclad Data Privacy

Customer data is never used to train or improve any AI models.

Customer data is never used to train or improve any AI models.

Customer data is never used to train or improve any AI models.

Enterprise Security
Enterprise Security
Enterprise Security

SAML 2.0/OIDC SSO, adaptive MFA, granular RBAC, and full audit logs.

SAML 2.0/OIDC SSO, adaptive MFA, granular RBAC, and full audit logs.

Ready to try altHQ?

Ready to try altHQ?

Contact our team for a personalized demo and see how altHQ can transform your professional workflows.

Contact our team for a personalized demo and see how altHQ can transform your professional workflows.

© 2025 ALTHQ, INC. | 2261 Market St. #5087 San Francisco, CA 94114 | inquiries@althq.com | tel: 650-249-2888

© 2025 ALTHQ, INC. | 2261 Market St. #5087 San Francisco, CA 94114 | inquiries@althq.com | tel: 650-249-2888

© 2025 ALTHQ, INC. | 2261 Market St. #5087 San Francisco, CA 94114 | inquiries@althq.com | tel: 650-249-2888

AI That Understands
Private Markets.