🇬🇧
/Security

Your assets,
our fortress

//
As a crypto company that you trust with your assets, we're serious about security. We take a holistic approach to information protection, so technical measures and security policies go hand in hand.
Your funds' safety is the result of information protection policies that our team cares about.

5 pillar approach

01
/ 5
/Identify
Focusing on actions that allow us to better predict threats by identifying types of vulnerabilities and assets potentially at risk.
/Protect
Analyzing safeguards from both common and emerging forms of attacks to ensure maximum security.
/Detect
Defining how threats against assets are detected by utilizing advanced security controls and cutting-edge technologies.
/Respond
Outlining the best solutions for detected threats and developing new approaches to enhance our response and recovery capabilities.
/Recover
Defining the best course of action to effectively fix impacted infrastructure and maintain robust security measures.
/Security

Where we always play by the rules

Acceptable use policy

The EMCD team acts in accordance with regulations and policies, safeguarding our brand and reputation.

Information security policies

Aligned with ISO 27000 standards, these policies ensure the confidentiality, integrity, and availabilityof data.

Recover Identify Protect Detect Respond Recover Identify Protect Detect Respond Recover Identify Protect Detect Respond Recover Identify Protect Detect Respond Recover Identify Protect Detect Respond

Asset management

02
Asset inventory
Critical assets are carefully managed and classified to ensure their protection and optimal utilization.
Asset inventory
Information handling
Documents and media are handled according to strict classification and confidentiality policies.
Information handling
Retention and destruction
Sensitive information is retained according to confidentiality policies and deleted when no longer necessary.
Retention and destruction

Crypto encrypted

03

We use

Top-tier encryption
Robust procedures
TLS protocols
Top-tier encryption
Top-tier encryption
for hard drives, removable media, and mobile devices.
Robust procedures
Robust procedures
for the generation, storage, and rotation of cryptographic keys.
TLS protocols
TLS protocols
with secure encryption algorithms during transmission.

All systems under control

04
Сomprehensive safety evaluations
Our software undergoes thorough security checks to ensure maximum protection.
Сomprehensive safety evaluations
Reviewing third parties
All external services undergo detailed security and privacy evaluations to safeguard data.
Reviewing third parties
Our approach to incident response

The Security Incident Response Management Plan (SIRMP) and Cyber Security Incident Response Team (CSIRT) ensure that we are prepared to investigate and respond to any security incidents promptly and effectively.

/SIRMP/CSIRT

Our approach to incident response

Join EMCD Today

Experience the peace of mind that comes with managing your crypto assets in a secure and trusted ecosystem.

Join EMCD and take advantage of our robust security measures designed to protect your investments.

Create account