SIGN UP SIGN IN

At Providus, Security is a Certainty.

Providus Finance builds industry-leading Bitcoin security into every product and service.

Secure Bitcoin Custody

A new standard of security for financial services. 


  • Offline & in Cold Storage          

               We require multiple signatures to identify and authorize a transaction, reducing system vulnerability.            

  • Geographically Dispersed Keys          

               Our Bitcoin infrastructure is self-hosted and physically located inside of military grade vaults in highly secure data center facilities.        

  • Layered Security 

               Over 99% of clients’ Bitcoin is kept offline in cold storage to maximize the security of their investment.       

  • Military-grade Physical Storage             

               Access to cold storage keys requires traveling to multiple geographically dispersed locations.  


Account Security

 All accounts are protected from theft by industry leading security standards.

               

  • Multi-factor Authentication       

               We require multi-factor authentication upon account creation with a  time-based one-time password or SMS/Text verification.          

     

  • Password Encryption          

               Account passwords are hashed via bcrypt with a work factor of 14.          

           

Data Security

 We protect your data with advanced security infrastructure.

               

  • Rigorously Managed Data Security Standards          

               We store the least amount of data for the shortest time possible and use tiered, role-based access controls.              

  • Fully Encrypted Data          

               All application data is encrypted with AES256-GCM.          

     

  • Self-hosted Infrastructure          

               We use physically isolated, self-hosted infrastructure to eradicate the potential for Spectre-class vulnerabilities.              

  • Compliance & Certifications          

               Non-critical operations leverage cloud infrastructure that has undergone SOC 2 Type II examinations.