Light Dark
Bank Login Loan Portal My Insurance Investor Access Track Payment Reward Point Credit Tools Tax & Compliance KYC & AML Security Center API Support Fraud Report

At Joint Shares, we are committed to delivering secure, compliant, and client-focused financial services—from personal lending to institutional investments

Security Information | Joint Shares LLC

Advanced Security Measures

Protecting Your Assets with Military-Grade Security Infrastructure

Joint Shares LLC employs a multi-layered security approach to ensure the safety of your financial assets and personal information.

99.99%
Uptime Guarantee
256-bit
Bank-Level Encryption
24/7
Security Monitoring
$5B
Assets Protected

Advanced Data Encryption

Military Grade
All sensitive data is encrypted using industry-leading algorithms that exceed financial industry standards.
Your Data is Secured with AES-256 Encryption
1

AES-256 Encryption

Advanced Encryption Standard

We use AES-256 encryption, the same standard adopted by the U.S. government for protecting classified information. This symmetric encryption algorithm ensures that even if data is intercepted, it remains completely unreadable without the proper decryption key.

  • 256-bit key length provides 2^256 possible combinations
  • Approved by NSA for top-secret information
  • Faster and more efficient than older standards
Active on all data storage and transmission
2

TLS 1.3 Protocol

Secure Data Transmission

All data transmitted between your device and our servers is protected with TLS 1.3, the latest and most secure version of the Transport Layer Security protocol. This ensures that your information remains confidential during transmission over the internet.

  • Zero-round-trip-time (0-RTT) handshake for faster connections
  • Removed vulnerable cryptographic algorithms
  • Perfect forward secrecy for session keys
Enabled for all web and API communications
3

Database Encryption

Encryption at Rest

All sensitive data stored in our databases is encrypted using transparent data encryption (TDE). This means that even if someone gains physical access to our storage media, they cannot read the data without the encryption keys.

  • Field-level encryption for maximum granularity
  • Automatic key rotation every 90 days
  • Hardware Security Modules for key protection
Applied to all customer databases
4

End-to-End Encryption

Client-Side Encryption

For maximum privacy, we implement end-to-end encryption where data is encrypted on your device before being sent to our servers. This means we never have access to your unencrypted data, providing an additional layer of security.

  • Encryption occurs before data leaves your device
  • Zero-knowledge architecture for sensitive data
  • Protection against server-side breaches
Available for sensitive communications

Multi-Factor Authentication

Advanced Identity Verification
Our multi-layered authentication system ensures that only authorized individuals can access your accounts.
Password
2FA
3
Biometrics
4
Behavioral
5
Contextual
5

Multi-Factor Authentication

Layered Security Approach

We require multiple forms of verification before granting access to your account. This typically includes something you know (password), something you have (mobile device), and something you are (biometric data).

  • Time-based one-time passwords (TOTP)
  • Push notifications to registered devices
  • Backup codes for emergency access
Mandatory for all account access
6

Biometric Authentication

Advanced Identity Verification

For supported devices, we offer biometric authentication including fingerprint scanning, facial recognition, and voice identification. These methods provide a seamless yet highly secure way to access your account.

  • Touch ID and Face ID integration
  • Windows Hello compatibility
  • Behavioral biometrics for continuous authentication
Available on supported devices
7

Session Management

Intelligent Session Controls

Our system automatically manages session security with features like automatic logout after periods of inactivity, session time limits, and the ability to view and terminate active sessions from any device.

  • Automatic logout after 15 minutes of inactivity
  • Maximum session duration of 8 hours
  • Remote session termination capability
Active for all user sessions
8

Password Policies

Strong Credential Requirements

We enforce stringent password policies to prevent unauthorized access. This includes requirements for complexity, regular changes, and checks against known compromised passwords.

  • Minimum 12-character length requirement
  • Must include uppercase, lowercase, numbers, and symbols
  • Regular password expiration every 90 days
Enforced for all user accounts

Network Security Infrastructure

Advanced Threat Protection
9

Next-Generation Firewalls

Advanced Perimeter Defense

Our network is protected by state-of-the-art next-generation firewalls that inspect traffic at the application level, not just the port and protocol level, providing deeper security analysis.

  • Deep packet inspection for all traffic
  • Intrusion prevention systems (IPS)
  • Application-aware filtering
Active on all network boundaries
10

DDoS Protection

Distributed Denial of Service Mitigation

We employ advanced DDoS protection services that can absorb and mitigate even the largest attacks, ensuring our services remain available during coordinated attempts to disrupt service.

  • Multi-terabit per second mitigation capacity
  • Real-time traffic analysis and filtering
  • Global scrubbing centers
24/7 active protection
11

Zero Trust Architecture

Never Trust, Always Verify

We've implemented a Zero Trust security model that assumes no user or device is trustworthy by default, regardless of whether they're inside or outside our network perimeter.

  • Micro-segmentation of network resources
  • Least privilege access principles
  • Continuous verification of all access attempts
Implemented across all systems
12

Secure Remote Access

Protected Connections

All remote access to our systems requires secure VPN connections with multi-factor authentication, ensuring that even if credentials are compromised, unauthorized access is prevented.

  • IPsec and SSL VPN technologies
  • Network access control (NAC) integration
  • Split tunneling prevention
Required for all administrative access

Physical Security Measures

Tier IV Data Centers
13

Tier IV Data Centers

Maximum Uptime and Security

Our data is housed in Tier IV data centers, the highest classification for data center infrastructure, providing fault tolerance and redundancy across all critical systems.

  • 99.995% uptime guarantee
  • Dual-powered equipment and multiple uplinks
  • Geographic redundancy across multiple regions
Active across all primary facilities
14

Biometric Access Controls

Multi-Factor Physical Security

Access to our facilities requires multiple forms of authentication including biometric scans, smart cards, and PIN codes, with all access attempts logged and monitored.

  • Facial recognition and fingerprint scanning
  • Tailgating detection systems
  • Man-trap entry systems for sensitive areas
Implemented at all secure facilities
15

24/7 Surveillance

Comprehensive Monitoring

Our facilities are monitored around the clock with high-definition CCTV systems, motion detectors, and security personnel who conduct regular patrols.

  • High-resolution cameras with 360-degree coverage
  • Motion-activated recording and alerts
  • On-site security personnel 24/7
Active at all company facilities
16

Redundant Power Systems

Uninterruptible Power Supply

Our critical systems are protected by redundant power sources including UPS systems, backup generators, and multiple grid connections to ensure continuous operation.

  • N+1 redundant power distribution
  • Automatic transfer switches
  • 72-hour fuel supply for generators
Active across all data centers