Security at Mesh
Mesh provides a trusted, secure, and audited solution backed by a team that has decades of experience in providing secure, highly available solutions to customers. We use a combination of operational, application, and infrastructure-level security controls to ensure the security of client and end-user data.
Mesh is SOC 2 Type II certified, and as such undergoes regular audits and penetration testing with third-party security firms.
Mesh has implemented a robust security program designed to provide a trustworthy platform for connecting exchanges, wallets, and payment service providers. Our approach is proactive, adaptive, and built on industry best practices to safeguard data and transactions at every stage.
Zero Trust, Least Privilege Access
Mesh leverages highly available, scalable, and stable infrastructure that is protected by various layers of defense. We have employed zero trust and least privilege principles in our security architecture to enforce separation of duties and provide segregation of our environments. Access rights are reviewed regularly, multi-factor authentication is enforced for all administrative accounts, and idle sessions are automatically terminated to reduce risk of unauthorized access. Additionally, we actively monitor for malicious network traffic and anomalous system behavior.
Encryption at rest and in transit
Mesh employs strong encryption algorithms to protect data at rest, and in transit. We are committed to using robust encryption algorithms for protecting data at rest, protecting encryption keys and ensuring secure exchange of data. Encryption algorithm choices are specifically configured to provide industry standards or better levels of protection.
Security by design principles
Mesh follows a security by design approach, where security considerations are integrated into the initial planning and design phases of our products and addressed throughout the Secure Development Lifecycle. This ensures that security is not an afterthought but a core component of our product architecture. We have implemented automated and manual security reviews, checks and testing, ensuring that security is a continuous process.
Regular penetration testing by a trusted third party
We employ reputable third parties to conduct comprehensive penetration testing against our products prior to release and on an on-going basis. We also maintain an on-going program of external tests, internal vulnerability management and configuration audits to ensure continuous security coverage and rapid remediation of identified issues. Our intention is to simulate real-world attacks to identify and fix potential vulnerabilities, ensuring our products remain resilient against attacks.
End-user data
End-user PII may be temporarily handled when required to facilitate a transaction, but is not stored long term.
Mesh may store non-PII such as balances and portfolio holdings to improve the end-user experience, and all data is encrypted at rest and in transit.