Financial Services Cybersecurity

Contact CDI

Compliant IT Solutions For the Financial Industry


Financial Industry Regulatory Authority

Compliant Cybersecurity Solutions National Futures Association

Office of the Comptroller of the Currency

U.S. Securities and Exchange Commission Compliant Cybersecurity Solutions

Data Center Compliance


Defined by the American Institute of Certified Public Accountants (AICPA), SOC 2 Type II is recognized worldwide as one of the strictest audit standards for service providers.


The SOC 2 framework includes five key sections, forming a set of criteria called the Trust Services Principles:

  1. Security
  2. Availability
  3. Processing Integrity
  4. Confidentiality
  5. Privacy

Other Security Highlights

  • Video Recordings of All CDI Engineers Accessing Client Devices
  • Both Physical and Logical Provisions are Made to Segregate Tailwind Data from any Other Client’s Data
  • AES 128 Bit SHA1 Encryption Used in the Transmission of Data
  • Firewalls & IDS Detect Unauthorized Access Attempts.


Alternative Investment Technology Executives Club
Alternative Investment Technology Executives Club Approved

Active Threat Monitoring and Protection



eSentire financial services cybersecurity monitoring

eSentire Active Threat Protection

  • Real-Time threat detection and prevention
  • Fully Managed Security Operations Services
  • Log Aggregation, Correlation, & Analysis
  • Enhance detection, improve forensic investigation and compliance reporting
  • Targeted Retrospection Analysis Platform
  • Continuous Vulnerability Scanning
  • Host lock-down and quarantine prevents lateral spread of threats
  • Cloud-based malware protection for every connected device
active threat monitoring financial