Fingarde | Trust Center
FinGarde Trust Center
Welcome to the FinGarde Trust Center. Here, we take transparency and security as seriously as you do. Our commitment to safeguarding your data goes beyond industry standards—we treat your assets with the same care we give our own. From robust cybersecurity measures to regulatory compliance, every system we deploy is designed to protect what matters most: your trust. Explore our practices and learn how we're keeping your information secure, every step of the way.
See section

Resources

FinGarde - Service Delivery (Battle Plan)

Description of Managed IT Services and Cybersecurity Plan

Certificate of Liability Insurance

2024 COI

Profit & Loss / Balance Sheet

Profit and Loss Statement and Balance sheet as of 12/31/2023

External Vulnerability Reports

External scans of all active FinGarde IP Addresses.

FAQs

We prioritize the security of your clients' financial data by implementing industry-leading cybersecurity measures. Our team works tirelessly behind the scenes to protect your sensitive information using the latest in encryption, threat detection, and continuous monitoring. We also regularly update our security protocols to stay ahead of evolving threats, ensuring your data is always safe and secure.
We employ a multi-layered approach to cybersecurity, combining advanced firewalls, encryption, and threat detection systems to guard sensitive client information. Our systems are continuously monitored 24/7 to detect and mitigate potential threats before they can cause harm. Additionally, we implement best practices in secure authentication, including multi-factor authentication (MFA), to ensure only authorized personnel can access sensitive data.
We understand the strict regulations financial advisory firms must adhere to, including those set by the SEC and FINRA. Our cybersecurity protocols are designed to meet or exceed these regulatory requirements. We regularly audit our systems to ensure compliance, and we stay informed on regulatory updates to make necessary adjustments. We also provide documentation and reporting to assist with compliance audits and reviews, making sure your firm is always prepared.
We use a variety of tools to safeguard your firm against phishing, malware, and other attacks. This includes advanced email filtering solutions, web content filtering, and endpoint protection that blocks malicious software and suspicious activity. Additionally, we offer security awareness training to educate your team about how to recognize and avoid phishing attempts and other social engineering attacks, further reducing your firm’s risk.
We prioritize strict access controls to prevent unauthorized individuals from accessing your systems or client data. This includes implementing role-based access control (RBAC), where each team member only has access to the information necessary for their role. We also utilize multi-factor authentication (MFA) for an extra layer of security, ensuring that even if credentials are compromised, unauthorized access remains difficult. All access logs are monitored regularly for unusual activity.
In the event of a cybersecurity incident, we have a detailed incident response plan in place to contain, mitigate, and resolve the issue as quickly as possible. Our 24/7 monitoring allows us to detect suspicious activity early, and our response team is trained to take immediate action to prevent damage or data loss. Following any incident, we provide a full report, along with recommendations to strengthen security and prevent future breaches.
We believe in the solutions we provide because we use them ourselves. The same robust security systems we deploy for our clients are also in place within our own organization. This means that every firewall, encryption protocol, email filter, and security measure we recommend is tried, tested, and trusted by us on a daily basis. By using the same tools in-house, we gain first-hand experience with their effectiveness, allowing us to optimize and adjust our recommendations to best suit your firm's specific needs.

Subprocessors

Microsoft Azure

Data location: United States

Monitoring

Continuously monitored by Secureframe
View all

Compliance

Monitoring

Change Management

Configuration and Asset Management Policy
A Configuration and Asset Management Policy governs configurations for new sensitive systems

Availability

Business Continuity and Disaster Recovery Policy
Business Continuity and Disaster Recovery Policy governs required processes for restoring the service or supporting infrastructure after suffering a disaster or disruption.

Organizational Management

Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.

Confidentiality

Data Classification Policy
A Data Classification Policy details the security and handling protocols for sensitive data.
Data Retention and Disposal Policy
A Data Retention and Disposal Policy specifies how customer data is to be retained and disposed of based on compliance requirements and contractual obligations.

Vulnerability Management

Vulnerability and Patch Management Policy
A Vulnerability Management and Patch Management Policy outlines the processes to efficiently respond to identified vulnerabilities.

Incident Response

Incident Response Plan
An Incident Response Plan outlines the process of identifying, prioritizing, communicating, assigning and tracking confirmed incidents through to resolution.

Risk Assessment

Vendor Risk Management Policy
A Vendor Risk Management Policy defines a framework for the onboarding and management of the vendor relationship lifecycle.