Built for Banks. Secured Like One.

TBPI was designed from the ground up to meet banking regulatory requirements—whether you're using public data or integrating internal systems.

Starting Point: Public Regulatory Data

TBPI delivers immediate intelligence from publicly available sources—data that's already accessible to regulators, analysts, and competitors.

📊

FFIEC Call Reports

Quarterly regulatory filings submitted to federal regulators by every bank. Includes:

  • Balance sheet and income statement data
  • Capital ratios and asset quality metrics
  • Loan composition and deposit structure
📈

UBPR Analytics

Uniform Bank Performance Reports derived from Call Report data. Includes:

  • Peer group comparisons
  • Performance ratios and trends
  • Risk indicators and benchmarks

This data is already public. TBPI makes it actionable.

When You're Ready to Go Deeper

Many banks start with public data, then integrate internal systems for deeper analysis. When you do, TBPI provides bank-grade infrastructure.

🔐

Data Security

  • • AES-256 encryption at rest
  • • TLS 1.3 encryption in transit
  • • Isolated processing environment
  • • No external API calls with your data
  • • Data residency controls
📝

Audit & Compliance

  • • Complete audit logging
  • • Immutable access records
  • • Regulator-ready export
  • • Retention policy controls
  • • Change management tracking
🛡️

Access Control

  • • Role-based permissions
  • • SSO integration (SAML 2.0)
  • • Multi-factor authentication
  • • Session management
  • • IP allowlisting available

Built to Meet Banking Standards

SOC 2Type II
GLBACompliant
FFIECAligned
GDPRReady

GLBA (Gramm-Leach-Bliley Act)

Customer data protection requirements for financial institutions. TBPI's architecture ensures:

  • • Administrative safeguards for data handling
  • • Technical safeguards for system security
  • • Physical safeguards for infrastructure access

FFIEC Guidelines

Federal Financial Institutions Examination Council information security standards. TBPI aligns with:

  • • Information Security Handbook requirements
  • • Authentication and access control guidelines
  • • Audit and monitoring standards

SOC 2 Type II

Independent verification of security controls across:

  • • Security
  • • Availability
  • • Processing Integrity
  • • Confidentiality

GDPR

For banks with EU operations or customers:

  • • Data minimization principles
  • • Right to access and deletion
  • • Processing documentation

Built by People Who Understand What's at Stake

PerLucem was founded by veterans of the intelligence community and financial services—people who spent careers in environments where data security isn't optional.

We built TBPI to deliver strategic intelligence to community banks because we've seen what happens when smaller institutions lack the analytical firepower of their larger competitors. And we built it with security architecture that reflects where we came from.

Security FAQ

Does TBPI access my core banking system?

Not unless you choose to integrate. Public data analysis requires no connection to your internal systems.

Where is data processed and stored?

All processing occurs in isolated, SOC 2-certified cloud infrastructure with configurable data residency.

Can I get documentation for my examiners?

Yes. We provide regulator-ready security documentation and can support examination inquiries.

What happens if I want to stop using TBPI?

Any internal data you've integrated can be deleted on request with verification provided.

Questions About Security?

We're happy to walk through our security architecture, provide compliance documentation, or connect you with our security team.