Bank-Level Security

Your Data.
Protected.

Enterprise-grade security protecting your financial data, investment strategies, and personal information. Built for investors who take security seriously.

99.9%
Uptime SLA
AES-256
Encryption
24/7
Monitoring
SOC 2
In Progress

Enterprise Security.
Retail Price.

The same security infrastructure trusted by Fortune 500 companies, available to individual investors

End-to-End Encryption

All sensitive data encrypted at every stage

TLS 1.3 in transit
Latest encryption protocol for all data transfers
AES-256 at rest
Military-grade encryption for stored data
Encrypted backups
All backups encrypted with separate keys

Secure Cloud Infrastructure

Enterprise-grade hosting with redundancy and monitoring

AWS infrastructure
Hosted on Amazon Web Services (US region)
99.9% uptime SLA
Guaranteed availability with automated failover
Multi-region redundancy
Geographic backups for disaster recovery

Advanced Authentication

Multiple layers of account protection

Two-Factor Authentication (2FA)
TOTP authenticator apps or SMS codes
Password hashing
Bcrypt with high work factor
Session management
Automatic logout and device tracking

Privacy First

Your investment data stays yours

Zero data selling
We never sell or share your personal data
GDPR & CCPA compliant
Full compliance with privacy regulations
Data export & deletion
Download or delete your data anytime

Financial Data Protection

Your investment strategies, portfolios, and watchlists are protected with additional security layers

What We Protect

Portfolio holdings and positions
Watchlists and research notes
AI chat history and analysis
Custom alerts and notifications

What We Don't Store

Brokerage account credentials
Banking information
Credit card details
Social security numbers

MarketCI is read-only. We analyze data; we never execute trades or access your money.

24/7 Security Monitoring

Continuous threat detection and rapid incident response

Real-time Detection

Automated threat detection and alerts

  • • Intrusion detection systems
  • • Anomaly detection
  • • Failed login monitoring
  • • API abuse prevention

Rapid Response

Immediate action when threats detected

  • • Automated threat blocking
  • • Incident escalation protocols
  • • User notification system
  • • Forensic analysis

Regular Audits

Proactive security assessments

  • • Quarterly penetration testing
  • • Code security reviews
  • • Dependency scanning
  • • Compliance audits

Compliance & Standards

Meeting and exceeding industry security requirements

SOC 2
Type II
In Progress
GDPR
Compliant
EU Privacy
CCPA
Compliant
CA Privacy
ISO
27001
Planned

Security Practices

Secure Development Lifecycle (SDLC)
Security built into every stage of development
Role-based access control (RBAC)
Least privilege principle for all systems
Automated security testing
Continuous integration security scans
Detailed audit logging
Complete activity trails for compliance
Automated daily backups
30-day retention with point-in-time recovery
Responsible disclosure program
We reward security researchers

Found a Security Issue?

We take security seriously and appreciate responsible disclosure. If you've discovered a vulnerability, please let us know.

Response Time
< 24 hours
Bug Bounty
Case-by-case rewards
PGP Key
Available on request

Please do not publicly disclose the issue until we've had a chance to address it. We're committed to working with security researchers to resolve issues quickly.