ABOUT US

Drawing on our team’s background in financial market analysis, technical trading analysis, and the technology sector, TigerX offers in depth blockchain token market research as well as individualized trading consultancy services and trading ideas.

MARKET ANALYSIS

Development Team

We look at a project’s development team experience, educational background, and reputation to assess a project’s probability of success.

Liquidity

We analyze the availability of tokens for trading across the major exchanges and OTC marketplaces.

Mining

We analyze mining principals (Proof of Work, Proof of Stake, etc), difficulty, hashrate, block size, block update rate and miner activity.

Development Pipeline

We thoroughly research a project’s road map, from inception to service/project delivery

Viability

We analyze the commercial applicability and potential for growth.

Adoption

We include user adoption and availability of a token on various exchanges

TECHNICAL ANALYSIS

Volume
Analysis of trading volume of a particular token
Momentum
Which direction is token activity headed as it approaches either being overbought or oversold
Ichimoku Cloud
Technical analysis tool which blends technical market data to offer near-term market outlook
Candle and Pattern Analysis
The classic trader tools.

SECURITY

At TigerX we believe that savvy trading must be matched with sophisticated security in order to protect investments.  We developed a robust security posture which includes a blend of the following tools:


Secure Wallets

We use industry leading hardware and desktop wallets, including Trezor, Nano Ledger, MyEtherWallet, Armory and others to protect tokens from 3rd party attacks


Secure Communications

All TigerX personnel use high-end, commercially available secure communications applications to facilitate voice, text, video, messaging, and file transfer so that your data is protected in our hands


Good Policy

Technology and tools are only as good as the policies around them. We use secure storage for private keys, recovery codes and proprietary trading data and only operate on secure virtual or home networks with firewall and intrusion detection protection. Wherever possible we run local wallets on full nodes.

INDIVIDUAL CONSULTING

PORTFOLIO MANAGEMENT
ASSET BALANCING
MARKET TIMING
GETTING STARTED
WHICH EXCHANGES TO USE AND WHY
INITIAL COIN OFFERING (ICO) RATINGS
WALLET MANAGEMENT

CONTACT