Our founding team has extensive cybersecurity and legal experience. We understand how sensitive and important equity-related data is. We know that security needs to be airtight and understand the implications of any breach or leak. We built Slice to provide a global equity management solution that is fully secured at the highest standards.
Slice regularly undergoes external security penetration tests by reputable third-party vendors. To access our most recent report, please contact us at security@sliceglobal.com.
Slice regularly undergoes external security penetration tests by reputable third-party vendors. To access our most recent report, please contact us at security@sliceglobal.com.
Slice is hosted on the Google Cloud Platform (GCP). GCP data centers are monitored by 24×7 security, biometric scanning, and video surveillance and are SOC 2 and SOC 3 certified.
Slice provides you with the option to use Single Sign-on (SSO) for access control to our platform. This allows your organization to control login to the system and keep access secure.
Slice uses the latest and most advanced encryption at rest and in transit. All data in transit is encrypted using TLS. Data at rest is encrypted using AES-256.
Slice maintains a comprehensive data changes log that tracks every modification made to each object and piece of data within the platform. This robust log ensures that every change is recorded with precision, providing a detailed history of actions taken across your account.
Before development, we identify threats and vulnerabilities through threat modeling and risk assessments. This guides resource allocation and helps us prioritize security measures to safeguard our security page effectively.
Adhering to secure coding practices, we prevent common vulnerabilities. Regular security reviews and testing ensure early detection and mitigation of security weaknesses, making our security page resilient against emerging threats.
We establish continuous monitoring and incident response mechanisms to detect and respond to security incidents promptly. Real-time monitoring and post-incident reviews strengthen our ability to protect our security page and maintain user trust.
Every interaction within our platform is meticulously recorded, ensuring a complete, time-stamped audit trail. This provides you with real-time access to track changes and activities, allowing full accountability and visibility at every stage. With our audit trail, you can rest assured knowing your data is securely managed and always accessible.
With row-level security in place, each employee’s access is granted only to the specific data they are authorized to see. This approach ensures that sensitive information is always protected, maintaining the highest standards of privacy and security while offering full accountability over data access.
We manage physical access to our office according to the SOC 2 Type 2 and ISO 27001 standard. This includes video surveillance, a visitor log, and additional physical security systems.
Slice maintains a set of comprehensive security policies that are kept up to date to meet the ever-changing security environment. These policies are made available to all employees during onboarding and regular training. They’re also available internally through the company’s internal systems.
The Slice team includes security experts with an extensive cybersecurity background. They have been dealing with the most advanced related threats and technologies for over a decade. These experts are sharing their knowledge and training the rest of the team regularly through classes, phishing awareness tests, and by sending updates regularly.
Before onboarding starts, every new hire and contractor in Slice passes a thorough background check. They must attend an annual security training and work from secure devices only. When offboarding, we instantly disable departing employee’s devices, apps, and access to any of our internal systems.
We welcome ongoing feedback to continuously improve our security posture. Please see reach out to security@sliceglobal.com as needed.