Safeguard Your Alts Data With the Industry Leader
Get the inside scoop on what you can expect during Canoe's implementation process along with our approach to securing your valuable data.
How Canoe Secures Your Data
Our philosophy is that client data in Canoe should be more secure than it would be in the client’s ecosystem. Canoe has over 350 clients that trust us with their sensitive information. We take that responsibility very seriously and have implemented multiple layers of protection to ensure the safety and privacy of that data.
Principle of Least Privilege: Canoe follows the principle of least privilege access for our client-facing platform, and we review that access on a periodic basis.
Role Permissions: Our cybersecurity measures ensure that only authorized individuals have access to data, and authorization permissions can be defined on a role-by-role basis.
Secure Encryption via HTTPS: To protect our client-facing SaaS platform data, users can only access it over HTTPS.
Multi-Factor Authentication (MFA): We leverage industry-standard security measures, such as MFA, authentication/authorization modules, password complexity enforcement, IP filtering, identity federation, and user access groups for controlling feature and data access.
Session Timeouts: User sessions timeout after 30 minutes of inactivity and the session ID is not part of the application URL.
Credentials: Our clients are required to provide a username and password as well as an MFA code in order to access their accounts.
Systematic Reviews: Canoe systematically reviews the state of our technology with the help of external parties. As an industry standard, Canoe undergoes an annual SOC2 type 2 audit to validate the controls in place to safeguard customer data.
Advanced Encryption Algorithm: Canoe uses advanced encryption technology to protect all data transmission between our servers and our clients’ devices. Any data transmitted over the internet, including login credentials and financial statement data, is protected from hackers and other cyber threats. Canoe encrypts data in transit and at rest via an encryption algorithm.
Application-Only Access: Sensitive documents are available exclusively within the Canoe application to prevent insecure transfer by email.Testing and Assessments: Canoe employs industry-leading tools for cloud infrastructure vulnerability scanning, security testing, network penetration testing, web application penetration testing, and cloud security configuration assessments.
Cybersecurity Programs: Canoe participates in Blackstone’s Cyber Security program and meets with their portfolio cybersecurity team on a monthly basis to review our security posture.
Due Diligence Processes: Canoe undergoes a very stringent tech and security due diligence process to meet the standards of some of the most sophisticated cybersecurity-focused firms within the financial industry.
Provider and Supplier Requirements: Canoe requires our third-party suppliers to follow industry standard compliance and regulatory strategies and certifications. As a provider, Canoe supplies SOC2 certification which outlines protection, privacy, and incident response requirements.
Security Incident Response Plans: Canoe has a well-defined security incident response plan in place to ensure preparedness in the event of a security breach or other data loss incident.
Monitoring and Auditing Procedures: We have implemented rigorous monitoring and auditing procedures to detect and prevent any suspicious activity on the platform. This includes real-time monitoring of user behavior, as well as regular security audits to ensure that our systems are up-to-date and secure.
Proactive Detection: Canoe uses world-class tools to proactively detect and address issues before customers are impacted.
Comprehensive Audit Trail: All actions by authenticated users are logged, ensuring you have a complete historical audit trail.
Cybersecurity-Focused Cloud Configurations: Our cloud instance is configured to ensure cloud configuration drift is prevented, and we employ a number of different tools to support logging, monitoring, and alerting including those for detecting and troubleshooting application errors, infrastructure logging and monitoring, analyzing application and infrastructure logs, and intrusion detection and prevention.
Implementation Overview: What to Expect
CHECKLIST FOR ALTERNATIVE INVESTORS
8 Critical Considerations for Prioritizing Data Security in a Vendor Evaluation
As an alternative investor, the strength of a cybersecurity program is especially crucial as you are typically
dealing with sensitive, confidential documents and data. Without proper security measures in place, there is
a risk of data or documents being lost, accidentally deleted, or shared with unauthorized parties.
$8T+
AUA across clients
42K+
funds covered
350+
happy clients