Built for Banks. Secured Like One.
TBPI was designed from the ground up to meet banking regulatory requirements—whether you're using public data or integrating internal systems.
Starting Point: Public Regulatory Data
TBPI delivers immediate intelligence from publicly available sources—data that's already accessible to regulators, analysts, and competitors.
FFIEC Call Reports
Quarterly regulatory filings submitted to federal regulators by every bank. Includes:
- •Balance sheet and income statement data
- •Capital ratios and asset quality metrics
- •Loan composition and deposit structure
UBPR Analytics
Uniform Bank Performance Reports derived from Call Report data. Includes:
- •Peer group comparisons
- •Performance ratios and trends
- •Risk indicators and benchmarks
This data is already public. TBPI makes it actionable.
When You're Ready to Go Deeper
Many banks start with public data, then integrate internal systems for deeper analysis. When you do, TBPI provides bank-grade infrastructure.
Data Security
- • AES-256 encryption at rest
- • TLS 1.3 encryption in transit
- • Isolated processing environment
- • No external API calls with your data
- • Data residency controls
Audit & Compliance
- • Complete audit logging
- • Immutable access records
- • Regulator-ready export
- • Retention policy controls
- • Change management tracking
Access Control
- • Role-based permissions
- • SSO integration (SAML 2.0)
- • Multi-factor authentication
- • Session management
- • IP allowlisting available
Built to Meet Banking Standards
GLBA (Gramm-Leach-Bliley Act)
Customer data protection requirements for financial institutions. TBPI's architecture ensures:
- • Administrative safeguards for data handling
- • Technical safeguards for system security
- • Physical safeguards for infrastructure access
FFIEC Guidelines
Federal Financial Institutions Examination Council information security standards. TBPI aligns with:
- • Information Security Handbook requirements
- • Authentication and access control guidelines
- • Audit and monitoring standards
SOC 2 Type II
Independent verification of security controls across:
- • Security
- • Availability
- • Processing Integrity
- • Confidentiality
GDPR
For banks with EU operations or customers:
- • Data minimization principles
- • Right to access and deletion
- • Processing documentation
Built by People Who Understand What's at Stake
PerLucem was founded by veterans of the intelligence community and financial services—people who spent careers in environments where data security isn't optional.
We built TBPI to deliver strategic intelligence to community banks because we've seen what happens when smaller institutions lack the analytical firepower of their larger competitors. And we built it with security architecture that reflects where we came from.
Security FAQ
Does TBPI access my core banking system?
Not unless you choose to integrate. Public data analysis requires no connection to your internal systems.
Where is data processed and stored?
All processing occurs in isolated, SOC 2-certified cloud infrastructure with configurable data residency.
Can I get documentation for my examiners?
Yes. We provide regulator-ready security documentation and can support examination inquiries.
What happens if I want to stop using TBPI?
Any internal data you've integrated can be deleted on request with verification provided.
Questions About Security?
We're happy to walk through our security architecture, provide compliance documentation, or connect you with our security team.