New on Allium: March 2025
Read More
Products

Products

Allium Datashares

Bulk data delivery direct to your data lake – control your compute while maintaining query privacy.

Allium Datastreams

Allium Datastreams delivers real-time event data through enterprise message brokers (Kafka/PubSub/SNS)

Allium Developer

Build and scale your real-time applications with our low-latency APIs and custom workflows. From wallet balances to DEX trades, get the data you need in milliseconds.

Allium Explorer

Simplify your data exploration journey with our one-stop destination for cross-chain intelligence. Queries, visualizations, API configuration, and much more – all in one place.

Documentation

Allium Explorer

Read more
Allium Developer

Read more
Allium Datashares

Read more
Allium Datastreams

Read more
View all Docs
Use CasesAboutCareersDocsBlog
Login
Book a Demo

Security and Privacy

SOC II Compliant

Security and privacy at Allium

Introduction

Allium is committed to protecting the confidentiality, integrity, and availability of data in our possession. This security policy outlines the measures and guidelines we follow to ensure the security of our data assets, information systems, and infrastructure. All employees, contractors, and third-party partners are expected to comply with this policy to maintain a secure environment for our data.

Information Classification

Data Classification

All data within Allium is classified based on its sensitivity and criticality. The following classification levels are defined:

a. Highly Sensitive: Data that, if disclosed, could result in significant harm to individuals or the company, or a violation of legal or regulatory requirements.

b. Sensitive: Data that requires protection due to privacy or business considerations.

c. Internal Use: Data that is intended for internal use only and has no specific privacy or business sensitivity.

d. Public: Data that can be freely disclosed without any restrictions.

​

Data Handling

Data handling procedures are followed based on their classification:

a. Highly Sensitive and Sensitive Data:

  • Access is limited to authorized personnel.
  • Encryption is used for data in transit and at rest.
  • Data is securely stored and transmitted.
  • Data is regularly backed up and tested for restoration.
  • Data is securely disposed of when no longer needed.

b. Internal Use Data:

  • Access is limited to employees with a legitimate need.
  • Encryption is used for data in transit and at rest when appropriate.
  • Data is stored and transmitted securely.

c. Public Data:

  • Access can be granted to the general public without restrictions.
  • Protection mechanisms are implemented to prevent unauthorized modifications.

​

Access Control

User Access Management

Access to information systems and data is granted on a need-to-know basis, following the principle of least privilege. The following practices are implemented:

a. User accounts are created for individual employees and tied to their unique identities.

b. Access privileges are granted based on job responsibilities.

c. User access is promptly revoked or modified upon employee termination, transfer, or change in responsibilities.

d. Strong passwords are enforced, and multi-factor authentication (MFA) is utilized for critical systems and privileged accounts.

e. Regular audits and reviews of user access rights are conducted to ensure compliance.

​

Remote Access

Remote access to company systems are governed by the following guidelines:

a. Remote access are granted based on business requirements and user needs.

b. Secure connections, such as virtual private networks (VPNs), are used for remote access.

c. All remote access sessions are logged and monitored for suspicious activities.

​Network and Infrastructure Security

Network Security

Allium maintains a secure network environment by implementing the following measures:

a. Firewalls and intrusion prevention systems (IPS) are in place to protect the network from unauthorized access and malicious activities.

b. Network traffic is monitored for anomalies and security events.

c. Wireless networks are secured with strong encryption and access controls.

d. Regular vulnerability assessments and penetration testing are performed to identify and address security weaknesses.

​

System and Application Security

Systems and applications is secured by adhering to the following practices:

a. Regular patch management are implemented to ensure systems and applications are up to date with security patches.

b. Antivirus and anti-malware software are installed and regularly updated on all systems.

c. Secure configurations and hardening guidelines are followed for all systems and applications.

d. Secure coding practices are followed during application development to minimize vulnerabilities.

​

Incident Response and Reporting

Allium has an incident response plan in place to address security incidents promptly and effectively. The following procedures are followed:

a. All employees are aware of the incident reporting process and promptly report any security incidents or suspected breaches.

b. Incidents are documented, investigated, and escalated as appropriate.

c. Remediation actions are taken to mitigate the impact of the incident and prevent future occurrences.

d. Lessons learned from security incidents are documented and used to improve security controls and processes.

​

​

Security Awareness and Training

Allium applies security awareness and training programs to employees, contractors, and third-party partners. The training covers the following areas:

a. Information security policies and procedures.

b. Data classification and handling.

c. Password management and best practices.

d. Social engineering and phishing awareness.

e. Reporting security incidents.

Compliance and Auditing

Allium complies with all applicable laws, regulations, and industry standards. Regular security audits and assessments are conducted to evaluate the effectiveness of security controls and identify areas for improvement.

​

Policy Review and Updates

This security policy is reviewed periodically and updated as necessary to reflect changes in the organization, technology, and regulatory landscape. All employees are notified of policy updates and trained accordingly.

By adhering to this security policy, Allium aims to protect its data assets, ensure the privacy of individuals, and maintain the trust of its customers and stakeholders.

Accelerate with Allium today

Join crypto's leaders in unlocking the power of blockchain data with Allium.

Get Started
Thank you for subscribing!
Please enter a valid e-mail address
Stay updated with the latest news and insights in blockchain.
Product
Allium Explorer
Allium Developer
Allium Datastreams
Allium Datashares
Use Cases
AnalyticsEngineering
Resources
Documentation
SchemasData Delivery
Blog
No items found.
© 2025 Allium. All rights reserved.
Terms of ServicePrivacy PolicySecurity and Privacy