Security and compliance are our foundation.

At Bridge, safeguarding your data has been a core commitment from day one. We rely on trusted infrastructure, thorough audits, leading industry certifications and our Cultural Pillars to ensure your information stays secure.

Bridge Invest, SOC for service organizations

Our Principles of Security and Compliance

1

SOC 2 Certified Security

As a SOC 2 Type II certified company, Bridge is designed to protect customer data. Our security controls are independently audited to ensure they meet or exceed industry standards.

2

Advanced Encryption Standards

All data is stored in AWS data centers with enterprise-grade physical and network security. Encrypted both at rest and in transit, with PII protected by an additional layer of application-level encryption.

3

Defense-in-depth

We employ layered, redundant security controls to protect data, ensuring that if one layer fails, others remain in place. Critical functions are separated across multiple individuals to prevent any single point of control.

4

Continuous Monitoring and Improvement

Observable systems are regularly capturing, logging and alerting on our security measures to keep Bridge effective - and your data safe - against evolving threats.

Our Cultural Pillars: Security is Job Zero

Proactivity

Security is embedded into every process, decision, and development stage from the outset.

Ongoing Education

Regular training and awareness programs keep security at the forefront of everyone's mind.

Shared Responsibility

Every employee, regardless of role, is accountable for maintaining security.

Empowered Decisioning

Security considerations are a key factor in all business decisions, not an obstacle to be overcome.

Want to see how Bridge can transform the way you manage alternative investments?