Vansah offers 3 layers of application security
Ensures maximum security in data transfer. Prevents login and password theft. All communications to and from the Vansah’s application are encrypted in bank-grade security protocol.
Backed by Testpoint, all our systems are continuously monitored for security, availability and performance. Today Vansah operates a highly scalable and redundant infrastructure backed by a 99.99% uptime service level agreements.
Vansah employs Testpoint’s Security’s industry-leading testing solution to regularly assess, verify and safeguard our customers confidential data from security breaches and hacker attacks. Testpoint conducts rigorous and ongoing security and application testing for many Fortune 500 companies and small to medium size organization including Vansah.
Regular Secure Backups
Vansah incorporates the latest industry standards when it comes to real-time backups, recovery and software deployment processes. This provides confidence to our customers that data is regularly encrypted, backed up and available.
The Cloud Providers are responsible for the data centers that host Vansah. For more information about security at those data centers, please go to the appropriate links below:
- AWS: https://aws.amazon.com/security
- Digital Ocean: https://www.digitalocean.com/trust/certification-reports
- MongoDB Atlas: https://www.mongodb.com/cloud/atlas/aws-mongodb
Vansah is hosted using (AWS), (Digital Ocean) and (MongoDB Atlas).
Application and Network Security:
The application and network security deployed to support Vansah is protected by redundant firewalls and load balancers. Our data center providers are ISO 27001 certified to ensure confidential data constantly protected while maintaining optimal performance. We monitor all systems 24/7 for availability and performance related incidents to pro-actively troubleshoot and resolve issues. Many of our servers and network equipment are designed in a redundant way with automatic active failover.
Our applications feature industry security standards with encrypted storage, including backups .
The Cloud Providers are responsible for managing the security of the cloud. They have been certified by third-party organizations and are compliant with the applicable laws and regulations. The list of such certifications and compliance statements can be found in the links below:
- AWS: https://aws.amazon.com/compliance/
- Digital Ocean: https://www.digitalocean.com/trust/certification-reports/
- MongoDB: https://www.mongodb.com/security
Development and Access Practices:
Our teams follow the proven industry best practices achieving a high level of security and monitoring in our application code. To ensure a high code quality, we employ regular Testpoint code reviews, revision control and change management. We also maintain our own secure framework as part of our stack to limit third-party dependencies and to manage critical code in a central place.
All access to data within Vansah is governed by access rights and user authentication. Operations and customer service policies follow many industries best practices limiting access to customer data.
If you need to raise a security related issue or bring to our attention a vulnerability which needs further investigation please submit your issue here