Aegispeak

COOKIES & DATA PROCESSING

How Aegispeak Handles Your Data On This Site

This page explains how Aegispeak uses cookies and similar technologies on our website, and how we process personal data collected through forms, subscriptions and analytics.

It covers website data only. For client engagements, NDAs and security architecture work, we use stricter controls that are set out in our contracts and data processing addenda.

banner

Answers You Can Trust Short, straight answers to the questions we hear most from fintech and cloud-native teams.

What Data We Collect On The Website

  • Who is Aegispeak for?

    Aegispeak works best with:

    glyph_03 Fintechs, wallets, BNPL and payment platforms

    glyph_03 SaaS products that handle card, PII or financial data

    glyph_03 Cloud-native teams already shipping to production and scaling

    If you’re dealing with PCI DSS, SOC 2, KYC / AML or bank / investor due diligence, you’re in the right place.

  • What types of services do you offer?

    We focus on four core service lines:

    glyph_03 Fintech Security Architecture Reviews

    glyph_03 API & Microservices Security

    glyph_03 Fraud & Transaction Monitoring

    glyph_03 KYC / AML & Compliance Integration

    Each has a dedicated service page with scope, steps and deliverables.

  • How do we get started?

    Three simple options:

    glyph_03 Book a 30-minute review call from the hero/CTA.

    glyph_03 Send us context via the Contact form (stack, current concerns).

    glyph_03 We’ll propose scope, timeline and a fixed-fee quote.

    No long discovery project, just enough information to scope the first engagement properly.

  • Do you only work with fintech companies?

    Fintech and payment-heavy platforms are our primary focus, but we also work with:

    glyph_03 SaaS products that store or process sensitive data

    glyph_03 Marketplaces and platforms with complex payment flows

    glyph_03 Cloud-native B2B products that need PCI / SOC 2-aligned controls

    If your risk looks similar to a fintech stack, we can usually help.

Scope & Deliverables

  • What’s included in a Fintech Security Architecture Review?

    A typical review includes:

    glyph_03 System context and data-flow diagrams

    glyph_03 Threat mapping for key payment and account flows

    glyph_03 Risk-ranked issue list with clear owners

    glyph_03 Recommended patterns for auth, tokens, secrets and logging

    glyph_03 PCI / SOC 2-aligned control mapping for the reviewed scope

    You receive everything as a reusable pack your engineers, leaders and auditors can share.

  • How is API & Microservices Security different?

    API & Microservices Security zooms in on:

    glyph_03 Public and internal APIs, gateways and service-to-service calls

    glyph_03 AuthN/Z models, rate limits and abuse-case defence

    glyph_03 Secrets management and configuration hardening

    glyph_03 OWASP API Top 10 and common fintech logic flaws

    We map where traffic really flows and where attackers will actually hit you.

  • What do you cover in Fraud & Transaction Monitoring?

    We look at:

    glyph_03 Your risk signals: events, metadata, behavioural patterns

    glyph_03 Rules, models and thresholds across vendors and internal engines

    glyph_03 Case management flows, queues and SLAs

    glyph_03 Reporting for banks, partners and regulators

    The goal is fewer surprises and less “mystery” around declines, chargebacks and fraud losses.

  • What about KYC / AML & Compliance Integration?

    Here we focus on how:

    glyph_03 Identity, sanctions and transaction-monitoring vendors fit together

    glyph_03 High-risk journeys (onboarding, top-ups, payouts) trigger checks

    glyph_03 Results flow back into your product, risk and support tooling

    glyph_03 Evidence is captured in a way regulators, partners and auditors can use

    We don’t replace your vendors; we help you make them work as one coherent system.

Process & Timeline

  • How long does a typical engagement take?

    For most architecture-level reviews:

    glyph_03 Small / focused scope: 2–3 weeks

    glyph_03 Broader / multi-product scope: 4–6 weeks

    We’ll give you a more precise estimate once we understand your stack and priorities.

  • Do you need production access or customer data?

    Usually no.

    glyph_03 We work primarily from diagrams, configs and non-production data.

    glyph_03 If log or event samples are needed, we prefer them anonymised.

    glyph_03 Any exceptional access is agreed upfront and kept to the minimum necessary.

    We design around privacy and least privilege.

  • Can you work fully remote?

    Yes. Most engagements are remote-first:

    glyph_03 Workshops and reviews via video calls

    glyph_03 Shared whiteboards and diagramming tools

    glyph_03 Secure document and artefact sharing

    On-site sessions can be arranged where there’s a clear benefit.

  • What do we need to prepare before you start?

    It helps if you can share:

    glyph_03 A list of key products / journeys (e.g. signup, checkout, payouts)

    glyph_03 Existing diagrams or architecture notes (if they exist)

    glyph_03 Current security / compliance goals or pain points

    glyph_03 Any incidents, near-misses or upcoming audits

    If you don’t have diagrams yet, that’s fine – we’ll help you build them.

Pricing & Commercials

  • How do you price your work?

    We prefer fixed-fee pricing per clearly defined engagement, based on:

    glyph_03 Scope and complexity of your stack

    glyph_03 Number of critical journeys and systems in review

    glyph_03 Depth of analysis and deliverables required

    You get a written proposal with scope, timelines and price before you commit.

  • Do you offer retainers or ongoing support?

    Yes. Many clients start with a focused review and then move to:

    glyph_03 A light retainer for periodic check-ins and design reviews

    glyph_03 Ad-hoc follow-up support during implementation

    glyph_03 Additional modules (e.g. API security or fraud stack review)

    We’ll shape something that matches your roadmap and team capacity.

Security, Confidentiality & Compliance

  • How do you handle confidentiality?

    We’re used to working with sensitive systems and data. As standard:

    glyph_03 We sign NDAs before going into detail.

    glyph_03 Artefacts are stored in restricted, access-controlled locations.

    glyph_03 We avoid copying production data and minimise any personal data.

    For regulated clients, we can align with your vendor-security or procurement processes.

  • Can you help us get ready for PCI DSS or SOC 2?

    Yes. Our goal is to design controls that actually work for engineers, then map them to frameworks:

    glyph_03 PCI DSS (especially for card-not-present platforms)

    glyph_03 SOC 2 (Security, Availability, Confidentiality)

    glyph_03 Support for ISO 27001 / 27002 alignment where relevant

    We’re not a QSAC or audit firm; we make sure your architecture, controls and evidence flows can stand up to one.

  • Do you provide documentation we can show auditors and investors?

    Yes. Your deliverable pack can be used as:

    glyph_03 System and data-flow diagrams

    glyph_03 Threat model and issue register

    glyph_03 Control descriptions and mappings

    glyph_03 Evidence plan for logging, monitoring and access control

    Most clients treat this as their internal “source of truth” for audits, onboarding and future redesigns.

Data, Privacy & Legal

  • What data about me do you collect through the website?

    On the site we collect only what we need to respond and improve:

    glyph_03 Contact details you submit in forms

    glyph_03 Email addresses for newsletter sign-ups

    glyph_03 Aggregate usage and performance metrics

    For full details, see our Privacy Policy and Cookies & Data Processing pages.

  • Do you use my data for advertising or selling to third parties?

    No.

    glyph_03 We do not sell your data to third parties.

    glyph_03 We don’t run third-party ads or re-targeting campaigns.

    glyph_03 Any third-party tools we use (e.g. analytics) act as processors under our instructions.

    Again, details live in the Privacy Policy and Cookies pages.

  • How can I update or delete my data?

    You can:

    glyph_03 Unsubscribe from emails using the link in any message we send.

    glyph_03 Contact us through the Contact page and request an update or deletion.

    We’ll confirm your request and act within a reasonable timeframe, subject to any legal retention requirements.

Still Have Questions?

Still Have A Question We Haven’t Answered? Tell us a bit about your product, stack and concerns, and we’ll reply with a clear next step—whether that’s a quick answer, a resource, or a suggested review.