{"id":431,"date":"2025-05-06T23:16:17","date_gmt":"2025-05-06T23:16:17","guid":{"rendered":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/?page_id=431"},"modified":"2025-05-15T22:43:34","modified_gmt":"2025-05-15T22:43:34","slug":"defence-in-depth-security","status":"publish","type":"page","link":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/defence-in-depth-security\/","title":{"rendered":"Defence In Depth Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"431\" class=\"elementor elementor-431\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c4fd3a e-flex e-con-boxed e-con e-parent\" data-id=\"3c4fd3a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-34737c4 e-con-full e-flex e-con e-child\" data-id=\"34737c4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bed918 elementor-widget elementor-widget-heading\" data-id=\"3bed918\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fireblocks SECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77fa002 elementor-widget elementor-widget-heading\" data-id=\"77fa002\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Battle-tested digital asset security\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-593bbf6 elementor-widget elementor-widget-heading\" data-id=\"593bbf6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure customer and investor funds from cyber attacks, internal collusion, and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d2b61a elementor-widget elementor-widget-button\" data-id=\"4d2b61a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request Demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fed49b7 e-flex e-con-boxed e-con e-parent\" data-id=\"fed49b7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-225eb4f e-con-full e-flex e-con e-child\" data-id=\"225eb4f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-215107b elementor-widget elementor-widget-heading\" data-id=\"215107b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Private key security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-981d133 elementor-widget elementor-widget-heading\" data-id=\"981d133\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Layer 1: MPC-CMP + Multi-cloud<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a4b3c6 elementor-widget elementor-widget-heading\" data-id=\"8a4b3c6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Designed to address new requirements of the digital asset space that have emerged as institutions have entered the ecosystem. MPC-CMP removes the single point of compromise from both external hackers and insiders \u2013 as the private key is never concentrated on a single device at any point in time.\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9b9120 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-button\" data-id=\"b9b9120\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Crypto custody is moving beyond a \u201chot vs. cold\u201d model<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-adf00ae e-con-full e-flex e-con e-child\" data-id=\"adf00ae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4398d60 elementor-widget elementor-widget-image\" data-id=\"4398d60\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"1200\" src=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-MPC-CMP-Multi-cloud.png\" class=\"attachment-full size-full wp-image-463\" alt=\"\" srcset=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-MPC-CMP-Multi-cloud.png 1200w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-MPC-CMP-Multi-cloud-300x300.png 300w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-MPC-CMP-Multi-cloud-1024x1024.png 1024w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-MPC-CMP-Multi-cloud-150x150.png 150w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-MPC-CMP-Multi-cloud-768x768.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d571b6b e-flex e-con-boxed e-con e-parent\" data-id=\"d571b6b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b2465e4 e-con-full e-flex e-con e-child\" data-id=\"b2465e4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd349fe elementor-widget elementor-widget-image\" data-id=\"bd349fe\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"1200\" src=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/assets-securely-transferred-to-date.svg\" class=\"attachment-full size-full wp-image-470\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9fce0a3 e-con-full e-flex e-con e-child\" data-id=\"9fce0a3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e4a162 elementor-widget elementor-widget-heading\" data-id=\"5e4a162\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HARDWARE ISOLATION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0bea0e elementor-widget elementor-widget-heading\" data-id=\"b0bea0e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Layer 2: Secure Enclaves\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c7c210 elementor-widget elementor-widget-heading\" data-id=\"6c7c210\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Private key shares stored in secure enclaves cannot be extracted even if malware or a hacker has control over the server\u2019s OS \u2013 as the memory space and the data in the enclave are encrypted. Fireblocks supports multiple secure enclaves for private key management including Intel SGX, AWS Nitro, and HSMs.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-88af912 e-flex e-con-boxed e-con e-parent\" data-id=\"88af912\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d056a70 e-con-full e-flex e-con e-child\" data-id=\"d056a70\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d10d2b1 elementor-widget elementor-widget-heading\" data-id=\"d10d2b1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WORKFLOW AUTHORIZATION\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-612a02c elementor-widget elementor-widget-heading\" data-id=\"612a02c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Layer 3: Policy Engine<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0eeb88 elementor-widget elementor-widget-heading\" data-id=\"f0eeb88\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Fireblocks Policy Engine, enables organizations to set up specific approval policies for every transaction. The Policy Engine allows users to configure a list of rules that affect how transactions are handled and approved.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89165ac elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-button\" data-id=\"89165ac\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Policy and Workflow Engine<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df90242 e-con-full e-flex e-con e-child\" data-id=\"df90242\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b8ccdb elementor-widget elementor-widget-image\" data-id=\"3b8ccdb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2378\" height=\"2151\" src=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-PolicyEngine-TX-Policies-v3-A@2x.png\" class=\"attachment-full size-full wp-image-477\" alt=\"\" srcset=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-PolicyEngine-TX-Policies-v3-A@2x.png 2378w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-PolicyEngine-TX-Policies-v3-A@2x-300x271.png 300w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-PolicyEngine-TX-Policies-v3-A@2x-1024x926.png 1024w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-PolicyEngine-TX-Policies-v3-A@2x-768x695.png 768w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-PolicyEngine-TX-Policies-v3-A@2x-1536x1389.png 1536w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-PolicyEngine-TX-Policies-v3-A@2x-2048x1853.png 2048w\" sizes=\"(max-width: 2378px) 100vw, 2378px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f882bd e-flex e-con-boxed e-con e-parent\" data-id=\"0f882bd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cb7a19d e-con-full e-flex e-con e-child\" data-id=\"cb7a19d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f4968b elementor-widget elementor-widget-image\" data-id=\"9f4968b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"394\" src=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-Network-Animation-Post-White.gif\" class=\"attachment-full size-full wp-image-491\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57a4d80 e-con-full e-flex e-con e-child\" data-id=\"57a4d80\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b1180a elementor-widget elementor-widget-heading\" data-id=\"9b1180a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DEPOSIT ADDRESS MANAGEMENT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac936ec elementor-widget elementor-widget-heading\" data-id=\"ac936ec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Layer 4: Fireblocks Network<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9400ff4 elementor-widget elementor-widget-heading\" data-id=\"9400ff4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Fireblocks Network is the only digital asset transfer network that completely mitigates the security risks associated with deposit addresses. The Network removes the need for copy-pasting deposit addresses and then authenticating them using time-consuming and risky test transfers and whitelisting procedures.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dae3855 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-button\" data-id=\"dae3855\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Digital Asset Transfer Network<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-362aab5 e-flex e-con-boxed e-con e-parent\" data-id=\"362aab5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2b7278e e-con-full e-flex e-con e-child\" data-id=\"2b7278e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9816830 elementor-widget elementor-widget-heading\" data-id=\"9816830\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ENTERPRISE-GRADE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7556db8 elementor-widget elementor-widget-heading\" data-id=\"7556db8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Insured & secured<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c97d5c4 elementor-widget elementor-widget-heading\" data-id=\"c97d5c4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The only security platform that insures assets in storage, transfer, and E&O. Fireblocks is SOC 2 Type II certified and completes regular pen testing from ComSec and NCC Group. We are also the first crypto tech company to be certified by the International Organization for Standards in security (ISO 27001), cloud (ISO 27017), privacy (ISO 27018), and Security and resilience \u2014 Business continuity management systems (ISO 22301).<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f8bd6d e-con-full e-flex e-con e-child\" data-id=\"9f8bd6d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-199e4d7 elementor-widget elementor-widget-image\" data-id=\"199e4d7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"820\" src=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-Insured-Enterprise-Ready@2x.png\" class=\"attachment-full size-full wp-image-493\" alt=\"\" srcset=\"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-Insured-Enterprise-Ready@2x.png 864w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-Insured-Enterprise-Ready@2x-300x285.png 300w, https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-content\/uploads\/2025\/05\/FB-Insured-Enterprise-Ready@2x-768x729.png 768w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Fireblocks SECURITY Battle-tested digital asset security Secure customer and investor funds from cyber attacks, internal collusion, and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. Request Demo Private key security Layer 1: MPC-CMP + Multi-cloud Designed to address new requirements of the digital asset space that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-431","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-json\/wp\/v2\/pages\/431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-json\/wp\/v2\/comments?post=431"}],"version-history":[{"count":16,"href":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-json\/wp\/v2\/pages\/431\/revisions"}],"predecessor-version":[{"id":1083,"href":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-json\/wp\/v2\/pages\/431\/revisions\/1083"}],"wp:attachment":[{"href":"https:\/\/techvantagenow.com\/clients\/crypto_concept_two\/wp-json\/wp\/v2\/media?parent=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}