ISSUER-AUTHORIZED SECONDARY MARKETS

Secondary Markets
Built With the Issuer,
Not Around Them

LIQUIFI partners directly with private companies to create custom secondary markets with issuer-defined trading conditions, structured inside purpose-built SPVs. Full cap table control. Full compliance. Full transparency.

🔒

Built on Venture360. The operating system for venture capital, trusted by thousands of funds managing billions in private assets.

HOW ISSUER-AUTHORIZED MARKETS WORK
🏢
Issuer Partners with LIQUIFI
Company defines trading rules, eligible buyers, pricing bands, and transfer conditions
📋
Custom SPV Structure Created
SPV organizes information rights, trading windows, investor eligibility, and reporting requirements
👥
Approved Investors Trade
Qualified buyers and sellers transact within issuer-defined parameters on the LIQUIFI platform
Issuer Retains Full Control
Every transaction is visible, approved, and compliant with the company's transfer restrictions

Cap table integrity maintained at every step.
No unauthorized transfers. No surprises.

 

HOW ISSUER-AUTHORIZED MARKETS WORK

A New Model for Secondary Liquidity

The issuer is in control from start to finish. Every step is designed around their requirements.

STEP 1
🏢

Issuer Partners with LIQUIFI

The company defines the trading rules: who can buy, pricing bands, volume limits, eligible buyer criteria, and transfer conditions. Everything starts with the issuer's approval.

STEP 2
📋

Custom SPV Structure Created

A purpose-built SPV is created that organizes information rights, trading windows, investor eligibility, reporting requirements, and all trading conditions into an enforceable legal structure.

STEP 3
👥

Approved Investors Trade

Qualified buyers and sellers transact within the issuer-defined parameters on the LIQUIFI platform. Every trade operates inside the boundaries the company set.

STEP 4

Issuer Retains Full Control

Every transaction is visible to the issuer, compliant with transfer restrictions, and recorded with a clean chain of custody. Cap table integrity is maintained at every step.

Cap table integrity maintained at every step.
No unauthorized transfers. No surprises.