what we do
concept
"Simplicity is the ultimate sophistication"
FOL·Ai™
(the web-app)
Fol
Gen AI Tailored to Investment Managers
FOL·Ai™ is a web-app, powered by Fol (the little green dot bot). It saves investment managers time and money by seamlessly filling the gaps where AI and ML can help. You can:
-
Get instant answers to any text or data based queries
-
Complete whole DDQs in under 10 minutes using Smart Multi-Q
- Easily create user-specific workspaces for any purpose
add-ins
(to the web-app)
Helping you become superhuman
security
No compromises
Need something a little more technical? Press the plus icons below.
End-to-End Encryption and Secure Data Management
We use end-to-end encryption to secure your data in transit, ensuring it's only readable by you. For stored data, we utilize the Advanced Encryption Standard (AES), safeguarding it against unauthorized access. Our infrastructure is fortified with Secure Socket Layer (SSL)/Transport Layer Security (TLS) protocols, providing a shield against breaches. We adhere to the highest security standards, incorporating NCSC14 cloud principles and AWS's security best practices to guarantee your information remains confidential and secure.
Data Use and Learning Protocols
We adhere to a strict 'no personal data learning' policy, compliant with General Data Protection Regulation (GDPR) guidelines. We guarantee that your data is not used for machine learning or algorithm training purposes, and no personal data is processed without explicit user consent.
Data Segregation, Anonymity Assurance & Access Control
Each user's data is isolated in secure containers, following best practices as outlined by the International Organization for Standardization (ISO) standards. For any data analytics that are performed to enhance our services, we use only anonymized datasets stripped of all Personally Identifiable Information (PII), in line with the principles of Privacy by Design and by Default. Our platform is secured with Single Sign-On (SSO) functionality, creating an easier login process while adhering to the highest standards of privacy and security as outlined by ISO.