Digivault, the secure digital asset custody provider, is going to be listed in the Polymath Service Provider Marketplace where security token issuers can connect with integrated providers including custody providers.
This will allow Digivault to broaden its reach into a burgeoning community of ecosystem participants, while offering Polymath users the opportunity to utilize Digivault’s simple and transparent custody services. Polymath provides organizations and issuers with the opportunity to create and manage a range of security tokens with ease and transparency, utilizing its smart contracts and its self-serve platform.
Digivault is committed to advancing transparency, security and inclusion in tokenized assets. Digivault believes that this collaboration with Polymath, who are also committed to building robust, regulatory adherent infrastructure, is an important stepping stone in the ascendance of the digital asset class, and this will expand the security infrastructure offerings for tokenized assets investors in the Polymath ecosystem while providing greater transparency for all users.
“Polymath has been driving industry-wide security token adoption. We are excited to announce this collaboration, which means users will now have access to unparalleled security assurance via Digivault’s custody offering”, said Mr. Robert Cooper, Chief Executive Officer of Digivault.
Graeme Moore, Head of Tokenization at Polymath said, “Digivault’s custody service is built from its foundation to be secure, driven by risk assessments and not relying on secrecy for security. At Polymath, we share this commitment to transparency and security, and it is brilliant to have Digivault join the strong network of providers that we have built.”
Digivault’s mantra of ‘Secure by Design’ is reinforced by internationally recognized standards and accreditations including Cyber Essentials Plus which is backed by the UK Government. Digivault has passed the rigorous process that ensures it has the measures in place to protect against the vast majority of common cyberattacks, including hacking, phishing, malicious software and ransomware and distributed denial of service (DDOS) attacks.