Our promise

Security and privacy are core to how we build and operate Pontera. We apply layered security approach across our infrastructure and SaaS platform, aligned with leading frameworks such as NIST CSF and ISO/IEC 27001. Our practices are continuously reviewed and evolved to reflect evolving threats and industry best practices.

Security compliance

Best-in-class security compliance

Security compliance

Best-in-class security compliance

Security compliance

Best-in-class security compliance

ISO/IEC 27001:2022

Pontera is certified under ISO/IEC 27001:2022, with ISO/IEC 27017 and ISO/IEC 27018 as part of our audited scope. Together, these internationally recognized standards affirm our security, cloud controls, and data-privacy protections.

ISO/IEC 27018

Pontera is certified for ISO/IEC 27018, the international standard for privacy in cloud computing. It ensures we implement strong controls to protect personally identifiable information (PII) stored and processed in the cloud.

ISO/IEC 27017 

Pontera is certified for ISO/IEC 27017, which provides additional security controls specifically for cloud services. This demonstrates our commitment to protecting customer data in cloud environments through industry-recognized best practices.

SOC 2 Type 2

SOC 2 Type 2 certification demonstrates our compliance with industry-leading standards for information security, including implementation of stringent security and privacy practices. Available upon request, Pontera's SOC 2 Type 2 certification is issued through Ernst & Young.

California Consumer Privacy Act

Pontera complies with privacy regulations, including the California Consumer Privacy Act to ensure the lawful and ethical handling of personal data.

Secure by design

As part of our commitment to building safer products, Pontera has joined the CISA Secure by Design pledge. This reflects our intent to keep improving and to make secure-by-default choices that protect our customers and their data.

Security practices

Proactive, always-on security practices

Security practices

Proactive, always-on security practices

Security practices

Proactive, always-on security practices

Secure infrastructure

Pontera’s infrastructure is secured in alignment with industry-recognized frameworks, including NIST Cybersecurity Framework and CIS Benchmarks. Our environment undergoes regular security assessments and audits to ensure continued alignment with best practices.

Monitoring and incident response

Pontera continuously monitors infrastructure, network traffic, and platform activity to detect anomalies, threats, or policy violations. Our security team follows a formal incident response plan and has established partnerships for expert-level response under strict SLAs when escalation is required.

Vulnerability management

Pontera takes proactive measures to identify and remediate system vulnerabilities. Regular assessments, scanning, and manual testing reduce potential attack surfaces. Routine penetration tests conducted by third parties, along with our private bug bounty program on HackerOne, help ensure our defenses remain resilient within the evolving cybersecurity landscape. If you believe you’ve found a security vulnerability, please report it.

Data protection

Data transmitted to or stored within Pontera is protected using encryption aligned with recognized industry standards, including TLS 1.2+ for data in transit and AES-256 for data at rest. Highly sensitive data is further protected using application-level encryption.

Secure infrastructure

Pontera’s infrastructure is secured in alignment with industry-recognized frameworks, including NIST Cybersecurity Framework and CIS Benchmarks. Our environment undergoes regular security assessments and audits to ensure continued alignment with best practices.

Vulnerability management

Pontera takes proactive measures to identify and remediate system vulnerabilities. Regular assessments, scanning, and manual testing reduce potential attack surfaces. Routine penetration tests conducted by third parties, along with our private bug bounty program on HackerOne, help ensure our defenses remain resilient within the evolving cybersecurity landscape. If you believe you’ve found a security vulnerability, please report it.

Monitoring and incident response

Pontera continuously monitors infrastructure, network traffic, and platform activity to detect anomalies, threats, or policy violations. Our security team follows a formal incident response plan and has established partnerships for expert-level response under strict SLAs when escalation is required.

Data protection

Data transmitted to or stored within Pontera is protected using encryption aligned with recognized industry standards, including TLS 1.2+ for data in transit and AES-256 for data at rest. Highly sensitive data is further protected using application-level encryption.

Secure infrastructure

Pontera’s infrastructure is secured in alignment with industry-recognized frameworks, including NIST Cybersecurity Framework and CIS Benchmarks. Our environment undergoes regular security assessments and audits to ensure continued alignment with best practices.

Vulnerability management

Pontera takes proactive measures to identify and remediate system vulnerabilities. Regular assessments, scanning, and manual testing reduce potential attack surfaces. Routine penetration tests conducted by third parties, along with our private bug bounty program on HackerOne, help ensure our defenses remain resilient within the evolving cybersecurity landscape. If you believe you’ve found a security vulnerability, please report it.

Monitoring and incident response

Pontera continuously monitors infrastructure, network traffic, and platform activity to detect anomalies, threats, or policy violations. Our security team follows a formal incident response plan and has established partnerships for expert-level response under strict SLAs when escalation is required.

Data protection

Data transmitted to or stored within Pontera is protected using encryption aligned with recognized industry standards, including TLS 1.2+ for data in transit and AES-256 for data at rest. Highly sensitive data is further protected using application-level encryption.

Privacy

Protecting your privacy at every step

Privacy

Protecting your privacy at every step

Privacy

Protecting your privacy at every step

Access control

Pontera follows a modern, risk-based access control framework designed to ensure that users receive only the access they need—and only when they need it. Strong authentication, contextual checks, and temporary, approval-based access for sensitive operations help maintain a secure environment while supporting operational efficiency.

Workforce practices

At Pontera, our team is committed to developing and enacting data privacy and information security practices that align with industry benchmarks and best practices. All employees undergo background checks, sign non-disclosure agreements, and complete mandatory security and privacy training programs to create a secure environment.

Reliability

Built with reliability in mind

Availability and continuity

Pontera deploys system uptime monitoring and 24/7 priority support. Our system is designed for resiliency and to withstand potential disruptions. Disaster Recovery Plans (DRP) and Business Continuity Plans (BCP) are continuously tested and updated to mitigate risks and allow the quick restoration of services in the event of unforeseen circumstances.

Backup and recovery

Secure and routine backups ensure the availability of customer data and enable speedy recovery in the event of data loss or system failure.

Assurance

Our client protection commitment

Assurance

Our client protection commitment

Assurance

Our client protection commitment

Client protection

Pontera is designed to help retirement savers receive professional guidance while their accounts remain protected — even as advisors take action on their behalf. When retirement savers authorize Pontera, they benefit from secure-by-design architecture, credential-free access, and strong safeguards that limit exposure and enforce accountability. This approach is embedded in our Commitment to Client Protection, which reflects our commitment to regulatory alignment and the secure delivery of advisor-led services.

Automatic supervision logging

Advisors and their compliance teams can leverage Pontera's supervision tracking capabilities to annotate advisor account reviews and changes.

Automatic supervision logging

Advisors and their compliance teams can leverage Pontera's supervision tracking capabilities to annotate advisor account reviews and changes.

No credential sharing

Pontera eliminates the need for advisors to request or store client login credentials. Pontera is purpose-designed to enable financial advisors to proactively analyze and rebalance plan accounts to deliver better retirement outcomes without requiring login credentials or direct account login. The platform never shares retirement savers' credentials and prohibits account logins, disbursements, transfers, or beneficiary changes that could constitute constructive custody under Rule 206(4)-2 of the SEC Advisers Act.

No credential sharing

Pontera eliminates the need for advisors to request or store client login credentials. Pontera is purpose-designed to enable financial advisors to proactively analyze and rebalance plan accounts to deliver better retirement outcomes without requiring login credentials or direct account login. The platform never shares retirement savers' credentials and prohibits account logins, disbursements, transfers, or beneficiary changes that could constitute constructive custody under Rule 206(4)-2 of the SEC Advisers Act.

Client protection

Pontera is designed to help retirement savers receive professional guidance while their accounts remain protected — even as advisors take action on their behalf. When retirement savers authorize Pontera, they benefit from secure-by-design architecture, credential-free access, and strong safeguards that limit exposure and enforce accountability. This approach is embedded in our Commitment to Client Protection, which reflects our commitment to regulatory alignment and the secure delivery of advisor-led services.

Automatic supervision logging

Advisors and their compliance teams can leverage Pontera's supervision tracking capabilities to annotate advisor account reviews and changes.

No credential sharing

Pontera eliminates the need for advisors to request or store client login credentials. Pontera is purpose-designed to enable financial advisors to proactively analyze and rebalance plan accounts to deliver better retirement outcomes without requiring login credentials or direct account login. The platform never shares retirement savers' credentials and prohibits account logins, disbursements, transfers, or beneficiary changes that could constitute constructive custody under Rule 206(4)-2 of the SEC Advisers Act.

Pontera Trust Center

Request access to our security assessment documentation, compliance reports, and more.

Pontera Trust Center

Request access to our security assessment documentation, compliance reports, and more.

Pontera Trust Center

Request access to our security assessment documentation, compliance reports, and more.

350 5th Avenue, Suite 2400, New York, NY 10118

Pontera Solutions Inc. All rights reserved.

Copyright Pontera Solutions Inc. All rights reserved

2026

©

Pontera’s services do not provide legal, tax, or other financial or investment advice, and should not be used as a source for making decisions regarding the foregoing. The information provided through Pontera’s platform is not a substitute for professional financial services. Investing in mutual funds, exchange traded funds, or other securities carries inherent risk to all or part of the amount invested and past performance information is not indicative of future returns. Subject to applicable law, under no circumstances will Pontera be liable for any decisions made, or actions taken or not taken, based on the use of the services or for any investment losses suffered as a result of the use of the services. Pontera market data is provided by Refinitiv.