Security at
Jay Solutions

Case studies

How we can help you

The J-Ray platform
Diverse and optimised for your needs

Innovative and user friendly

Aggregated, managed and consolidated data available on custom dashboards and reports, wherever and whenever you need it.

Read more

Transparency of Investment

We provide our customers with an objective, reliable and up-to-date view of their entire wealth, regardless of asset location and type.

Read more

People you can trust with your finance

Get personal service and support from our multi-disciplinary team of industry experts. Book a demo and learn how you can optimize your wealth management.

Read more

We understand that security is of paramount importance to our clients, and at Jay, we are committed to protecting your data and ensuring the reliability of our services.

We adhere to the standards of the International Organization for Standardization (ISO) for information security management, demonstrating our commitment to best practices. Holding an ISO 27001 certification signifies our adherence to internationally recognized best practices for information security management.

  • Identifying and managing security risks: We proactively assess threats and vulnerabilities, then implement controls to mitigate them.

  • Establishing secure processes: From data access and usage to incident response, we follow documented and audited procedures.

  • Continuous improvement: We regularly review and update our information security management system (ISMS) to stay ahead of evolving threats.

DevSecOps model

We integrate security considerations throughout the entire software development lifecycle, from design and coding to deployment and maintenance.

  • From the start: Secure coding practices and threat modeling are part of every developer's toolbox.

  • Built-in safeguards: Automated security testing is integrated into our development pipelines, catching vulnerabilities early.

  • Continuous monitoring: Security remains a priority even after deployment, with ongoing monitoring and updates.

Secure cloud services

We build and configure our cloud services based on the Center for Internet Security (CIS) best practices, ensuring a secure and resilient infrastructure.

Security monitoring

We have Security Operations Center (SOC) team continuously monitoring our IT infrastructure for anomalies and potential threats, proactively responding to any issues.

Leading security solutions

We leverage the best-in-class security solutions from industry leading vendors to safeguard our environment, devices, and IT services.

Comprehensive security testing

All our client-facing applications undergo comprehensive security testing, both internally and by independent external security experts. Our products are audited according to OWASP ASVS level 2 standard.

Additional security measures

  • Access controls:
    We implement strict access controls to ensure only authorized individuals can access sensitive data.

  • Data encryption:
    We encrypt data at rest and in transit, using industry-standard encryption algorithms.

  • Regular security audits:
    We conduct regular security audits to identify and address any potential vulnerabilities.

  • Incident response plan:
    We have a comprehensive incident response plan in place to effectively manage any security incidents.

  • Employee training:
    We regularly train our employees on security best practices to ensure they are aware of potential threats and can help maintain a secure environment.

Commitment to transparency

We are committed to transparency in our security practices. We regularly review and update our security policies and procedures, and we make them available to our customers upon request.

We encourage you to contact us if you have any questions or concerns about our security practices.

Our history

2012 — Forward

We originate from the wealth management world

2012 — 2019

A decade in the market
JAM Advisors was founded in 2012 as a wealth management and consolidated reporting company and JAY was an integral part of that business.

2019 – Acquired by CapMan
In early 2019, Nordic private equity pioneer CapMan buys a majority shareholding in JAM Advisors and starts the separation process.

Developing the first version of the product
Development of consolidated reports, analysis tools, and system architecture to serve the JAM customers.

2019 — 2022

Becoming independent
Beginning of 2021, wealth management was spun off from the reporting business, allowing JAY Solutions to focus on top-tier reporting solutions.

Rapid Product Development
J-RAY Platform modified to be usable by private bankers to view end client accounts, Private equity reporting, ESG reporting, investment planning etc.

Winning banking customers and establishment in Sweden
First client from Sweden, using J-RAY platform by its private bankers and end customers. First Finnish bank & asset manager as a customer. New Family office as a customer.

Now & the future

New main shareholder
February 2023 -New main shareholder in Bas Invest a Swedish based investor with background in developing software companies such at Momentum Software (sold to Advent/Aareon for 170 MEUR) and Opter.

Additonal resources for product development and data management
Management and Bas Invest are now owners of JAY and the ambition is to cement JAY as the clear leader in the Nordic market.

Establishment in Sweden
We are currently recruiting new resources to service the Swedish market.