Security at a glance

Security at a glance

  • Enterprise-grade encryption in transit and at rest
  • Logical data isolation for every client
  • No cross-customer data usage or model training
  • Full audit trails and role-based access controls
  • Architecture aligned with ISO 27001, SOC 2, and DORA principles

For teams that need more detail, the sections below expand on how these controls are implemented.

Heading 1

with a request body that specifies how to map the columns of your import file to the associated CRM properties in HubSpot.... In the request JSON, define the import file details, including mapping the spreadsheet's columns to HubSpot data. Your request JSON should include the following fields:... entry for each column.

Our security philosophy

Our security philosophy

Private markets data requires a higher bar for confidentiality, integrity, and resilience.

Tamarix is built around four core principles:
  • Data isolation by default
  • End-to-end encryption
  • Controlled, auditable access
  • Operational resilience

These principles guide how Tamarix is designed, deployed, and operated.

Heading 1

with a request body that specifies how to map the columns of your import file to the associated CRM properties in HubSpot.... In the request JSON, define the import file details, including mapping the spreadsheet's columns to HubSpot data. Your request JSON should include the following fields:... entry for each column.

Data protection & encryption

Data encryption

Data encryption

All customer data is encrypted throughout its lifecycle:

  • Data in transit is protected using TLS
  • Data at rest is encrypted using AES-256

This applies to documents, structured data, system logs, and backups.

Data isolation and ownership

Data isolation and ownership

Each customer’s data is managed within a logically isolated environment.

  • No cross-client data access
  • No cross-client model training
  • Full data ownership remains with the customer

Tamarix does not monetize, resell, or repurpose customer data.

Infrastructure & hosting

Infrastructure & hosting

Secure cloud infrastructure

Tamarix is hosted entirely within the European Union, with primary infrastructure located in Frankfurt, Germany.

  • Secure cloud infrastructure with network segmentation
  • Redundant systems and automated backups
  • Continuous system health monitoring and failover mechanisms

This ensures both data protection and service availability.

Heading 1

with a request body that specifies how to map the columns of your import file to the associated CRM properties in HubSpot.... In the request JSON, define the import file details, including mapping the spreadsheet's columns to HubSpot data. Your request JSON should include the following fields:... entry for each column.

AI and third-party security controls

Controlled use of AI

Controlled use of AI

Tamarix uses third-party AI providers to support document comprehension and data extraction — within strict security boundaries.

  • Tamarix is model-agnostic, selecting the best model for each task
  • AI usage is logged and auditable
  • Providers are contractually bound to confidentiality and data-protection obligations
No cross-customer training

No cross-customer training

Customer data processed by Tamarix:

  • Is not used to train shared or public models
  • Is not retained beyond strictly limited periods
  • Remains isolated within the customer environment

This aligns with zero-data-retention (ZDR) and strict data-segregation expectations common among institutional LPs.

Access control & auditability

01 Role-based access control

Role-based access control

  • Access is governed by role-based permissions
  • Least-privilege principles are enforced across users and systems
02 Full audit trails

Full audit trails

  • All user and system actions are logged

  • Data extraction, validation, overrides, and exports are fully traceable

  • Audit logs support internal oversight and regulatory review

Heading 1

with a request body that specifies how to map the columns of your import file to the associated CRM properties in HubSpot.... In the request JSON, define the import file details, including mapping the spreadsheet's columns to HubSpot data. Your request JSON should include the following fields:... entry for each column.

Operational security & resilience

Operational security & resilience

Tamarix maintains a strong operational security posture to ensure reliability and continuity.

  • IRegular vulnerability scanning and patch management
  • DDoS protection and traffic inspection
  • Automated backups and disaster recovery procedures

Availability and recovery

  • Uptime targets aligned with enterprise expectations
  • Rapid recovery from infrastructure or service failures
  • Periodic testing of disaster recovery workflows

Heading 1

with a request body that specifies how to map the columns of your import file to the associated CRM properties in HubSpot.... In the request JSON, define the import file details, including mapping the spreadsheet's columns to HubSpot data. Your request JSON should include the following fields:... entry for each column.

Privacy & regulatory alignment

Tamarix is designed to operate in regulated environments.

  • Full alignment with GDPR requirements
  • Client consent and authorization embedded into workflows
  • Data retention policies designed to meet regulatory and contractual obligations

While Tamarix is not yet formally certified, its security architecture and operating procedures are designed to align with the principles of:

  • ISO 27001
  • SOC 2
  • DORA

This allows LPs to assess Tamarix within familiar governance and risk frameworks without overstated claims.

What this means for LPs

What this means for LPs

  • Institutional-grade data protection
  • Clear data ownership and isolation
  • Transparent, auditable workflows
  • A security posture aligned with LP governance expectations

Security enables the platform — it never slows it down.

Heading 1

with a request body that specifies how to map the columns of your import file to the associated CRM properties in HubSpot.... In the request JSON, define the import file details, including mapping the spreadsheet's columns to HubSpot data. Your request JSON should include the following fields:... entry for each column.

Built to earn trust from day one

Tamarix is engineered to meet the security and resilience expectations of institutional LPs — today and as requirements evolve.

Heading 1

with a request body that specifies how to map the columns of your import file to the associated CRM properties in HubSpot.... In the request JSON, define the import file details, including mapping the spreadsheet's columns to HubSpot data. Your request JSON should include the following fields:... entry for each column.

Built to earn trust from day one

FAQ - Data Security

Answers to the most common questions about data security.

All customer data is stored within the European Union, with primary infrastructure in Frankfurt, Germany.

No. Customer data is never used for cross-customer model training and remains isolated within each client environment.

Yes. Tamarix maintains detailed audit logs covering data access, processing, validation, and exports.

Tamarix uses redundant infrastructure, automated backups, and tested recovery procedures to ensure service continuity.

Heading 1

with a request body that specifies how to map the columns of your import file to the associated CRM properties in HubSpot.... In the request JSON, define the import file details, including mapping the spreadsheet's columns to HubSpot data. Your request JSON should include the following fields:... entry for each column.