Top artists#1 Susumu Kamijo +53.4%#2 Issy Wood +30.4%#3 Richard Serra +13.2%#4 Andy Warhol +0.4%#5 Yayoi Kusama −2.1%#6 Gerhard Richter +22.0%#7 Alexander Calder +26.6% Top artists#1 Susumu Kamijo +53.4%#2 Issy Wood +30.4%#3 Richard Serra +13.2%#4 Andy Warhol +0.4%#5 Yayoi Kusama −2.1%#6 Gerhard Richter +22.0%#7 Alexander Calder +26.6%
LiveArt

Security

Enterprise-Grade
Security by Default

LiveArt handles sensitive market data and proprietary client information for institutional customers. Security is not an add-on — it is embedded in every layer of the platform, from infrastructure to API design to operational practices.

Enterprise clients can request access to our security documentation, architecture diagrams, and completed security questionnaires. Our AI methodology is published. Contact security@liveart.ai

Infrastructure

Cloud Infrastructure & Encryption

Cloud-Hosted Infrastructure

LiveArt runs on modern cloud infrastructure with managed services, leveraging decades of security engineering from leading cloud providers. Infrastructure is provisioned, monitored, and patched continuously.

Encryption at Rest

All data at rest is encrypted using AES-256, the industry standard used by financial institutions and government agencies. Database encryption uses managed keys with automated rotation.

Encryption in Transit

All API communications are encrypted via TLS 1.2 or higher. Connections using older protocols are rejected. Every request between client and server is encrypted end-to-end.

Automated Backups

Continuous automated backups with point-in-time recovery. Backup data is encrypted at rest and stored in a separate geographic region from the primary infrastructure.

Network Security

Network segmentation isolates production systems from development and staging environments. Firewall rules follow least-privilege principles. All inbound traffic is filtered and rate-limited.

High Availability

Multi-zone deployment with automatic failover. Published SLA of 99.5% monthly uptime for Enterprise clients. Scheduled maintenance windows communicated 48 hours in advance.

Access Control

Authentication & Authorization

API Key Authentication

Every API request is authenticated via Bearer token. Tokens are scoped to individual credentials and can be rotated at any time. Unauthenticated requests are rejected.

OAuth 2.0

User-scoped access via OAuth 2.0 for applications that act on behalf of individual users. Standard authorization code flow with PKCE support.

SSO / SAML

Enterprise clients can integrate LiveArt with their identity provider via SAML 2.0 single sign-on. Centralized user management, automated provisioning and deprovisioning.

Role-Based Access Control

Granular permissions scoped by role. API credentials can be restricted to specific endpoints and operations. Administrators control what each team member or application can access.

IP Allowlisting

Enterprise accounts can restrict API access to a defined set of IP addresses. Requests from non-allowlisted IPs are rejected before they reach the application layer.

Multi-Factor Authentication

MFA available for all platform accounts. Required for administrative access. Supports standard TOTP authenticator apps.

Operations

Monitoring & Incident Response

Continuous Monitoring

Infrastructure and application health monitored continuously with automated alerting. Anomaly detection on API usage patterns identifies unusual activity before it becomes a problem. Uptime and latency metrics tracked and available to Enterprise clients.

Request Logging & Attribution

Every API request is logged and attributed to the requesting credential. Logs include timestamp, endpoint, response status, and client metadata. Enterprise clients can request access to their own usage logs for compliance and audit purposes.

Incident Response

Defined incident response procedures with severity classification, escalation paths, and communication protocols. Critical issues receive a 4-hour response within business hours. Post-incident reviews conducted for all severity-1 events.

Security Practices

Regular security assessments, code review practices, and dependency scanning as part of the development lifecycle. Responsible disclosure welcomed at security@liveart.ai.

Data Governance

How We Handle Data

No Resale of Customer Data

Customer application data, usage patterns, and client information are never sold, shared, or used to benefit other customers. Your data is yours.

Data Isolation

Enterprise accounts operate in logically isolated environments. Customer-submitted data (portfolios, watchlists, client information) is segregated from other accounts at the application and database level.

Retention & Deletion

Clear data retention policies. Customer data is retained only for the duration of the subscription. Upon termination, customer-submitted data is deleted within 30 days, with written confirmation available on request.

GDPR Compliance

LiveArt complies with the EU General Data Protection Regulation. Data processing agreements are available for Enterprise clients. Data subject access and deletion requests are honored within statutory timeframes.

IP Protection

Published Terms of Service with clear intellectual property protections. Tiered enforcement for unauthorized access, redistribution, and ML training use. Anti-scraping monitoring on all API endpoints.

Audit Support

Enterprise clients can request usage reports, access logs, and security documentation for their own compliance and audit requirements. Quarterly business reviews include security posture discussion.

Compliance

Standards Alignment

LiveArt's security practices are designed to align with SOC 2 Type II and ISO 27001 standards. Our infrastructure, access controls, monitoring, and data governance practices follow the control frameworks defined by these standards. Formal certification is on our roadmap as we scale our enterprise client base.

SOC 2 Type II

Aligned

Security, availability, and confidentiality controls designed to meet AICPA Trust Service Criteria. Formal attestation on roadmap.

ISO 27001

Aligned

Information security management practices follow ISO 27001 control objectives. Formal certification on roadmap.

Enterprise clients evaluating LiveArt for procurement can request our security questionnaire, architecture documentation, and a call with our engineering team. Contact security@liveart.ai

Security at a Glance

AES-256

Encryption at Rest

Industry standard. All data encrypted.

TLS 1.2+

Encryption in Transit

Every API call encrypted end-to-end.

SSO

SAML 2.0

Enterprise identity provider integration.

RBAC

Access Control

Granular permissions per role and credential.

99.5%

Uptime SLA

Published, measurable commitment.

4 hrs

Critical Response

Within business hours.

GDPR

Compliant

DPA available for Enterprise.

24/7

Monitoring

Continuous. Automated alerts.

Questions About Security?

Our engineering team is available to discuss security architecture, compliance requirements, and enterprise deployment options.