Your signing stays under 50µs. Funds $100M to $5B AUM run Sentinel in shadow mode for a week before pointing live flow at it.
We do not claim other framework certifications today. Where compliance teams need a specific control map (NIST SP 800-53, ISO 27001), we provide it on request.
Sentinel runs inside an AWS Nitro Enclave you control. We don't custody your keys. We don't see your trades.
Append-only log with hash-chained entries. Regulators get read-only access via a signed audit token. Six-year retention enforced by the enclave itself, not by us. Tampering would require breaking the SHA-256 chain. We'd notice within one log scan.
Annual third-party security audit covering confidentiality, integrity, and availability of your trading infrastructure. Full attestation for LPs and regulators.
Keys and sensitive data stored in your VPC within your chosen geographic region. Full control over data residency. No cross-border data flows without your explicit approval.
Custody requirements, transaction reporting, operational resilience, all built-in. Deploy to EU without additional compliance work.
Your VPC. Your keys. Your control.
All infrastructure owned and managed by your institution.
Why institutional-grade funds choose Sentinel over alternatives.
| Sentinel | Fireblocks | AWS KMS | Hardware HSM | |
|---|---|---|---|---|
| Signing Latency | 62µs p99 | 500-2000µs | 100-500µs | 50-200µs |
| Vendor Key Access | Zero | Via MPC | AWS has access | HSM provider has access |
| Audit Trail | Immutable (SEC 17a-4) | Modifiable | CloudTrail (editable) | Device-local only |
| Policy Engine | Turing-complete | Rules-based | Fixed policies | No runtime policy |
| Attestation | PCR-based + software | No hardware attestation | AWS attestation only | Device certificate |
Deployed at scale for institutional capital.
Enclaves across EU, US, and APAC. Data residency compliance. Automatic failover.
Write arbitrary Rust logic for transaction validation. Enforce your risk limits at the enclave level.
Full access to proprietary Sentinel codebase. Deploy on your own hardware if needed.
24/7 engineering team. Direct hotline for critical incidents. Architecture review included.
Automated reports for SOC 2, SEC 17a-4, MiCA, and GDPR audits. Regulators included.
EU AI Act Article 14 compliant. Emergency halt of all signing operations in <1ms.
Pick the model that fits your security posture, ops capacity, and integration timeline. Every model preserves customer-owned keys and hardware attestation.
Sentinel enclave runs entirely inside your AWS account. We never touch your data plane.
You own the data plane (keys + signing). We manage the control plane (policy updates, audit pipelines, observability).
We ship engineers into your team for the duration of the pilot. Custom venue integrations, kernel-bypass tuning, founder-level engagement.
All three models share the same enclave, the same attestation surface, and the same key isolation. The difference is who runs the wrench.
Every engagement starts with a structured pilot. Shadow mode first, production cut-over second, signed success criteria at week 12.
VPC peering, identity bootstrap, key generation or import inside the enclave, PCR baseline captured. Your security + ops team get the attestation decoder + runbook.
Sentinel signs every transaction in parallel with your existing stack. We measure jitter delta + verify policy parity. Zero production risk until you flip the flag.
Canary rollout: 1% → 10% → 50% → 100% of signing traffic. Auto-revert if jitter or error budget breach. Your ops team owns the kill switch from day one.
Signed success criteria review: latency vs baseline, alpha retention bps, attestation audit log, runbook handoff. Convert to a multi-year contract, scale up, or part ways.
Move the sliders to see the modeled monthly alpha leakage your current jitter is shipping to the venue. The number is shape, not quote; we calibrate to your actual order book on the discovery call.
Modeled at $0.10 of slippage per $1M of notional per µs of P99 jitter (upper-middle of HFT-trader rule-of-thumb). Calibrated against architecture benchmarks, not a specific client. See methodology.
Architecture scenarios modeling the latency + custody-risk delta a $250M emerging fund could achieve with Sentinel deployed in an 8-week pilot.
Scenarios: not specific client engagements. Named references available under NDA after discovery.
Read the architecture scenariosWe can have Sentinel live in your VPC within 2-4 weeks. Shadow mode first, production on your schedule.