Security Features Policy

  • Home / Security Features Policy

Vansah is an Atlassian Fortified APP!

With 3 layers of application security.

Version: TP.03062021.02

Effective date: 04/March/2022

< Back

All our systems are continuously monitored for security, availability and performance. Today, Vansah operates a highly scalable and redundant infrastructure backed by a 99.99% uptime service level agreements.

Vansah employs Security’s industry-leading testing solution to regularly assess, verify and safeguard our customers confidential data from security breaches and hacker attacks. 

Regular Secure Backups

Automatic Updates

High Availability

Vansah incorporates the latest industry standards when it comes to real-time backups, recovery and software deployment processes. This provides confidence to our customers that data is regularly encrypted, backed up and available. 

Facilities:

The Cloud Providers are responsible for the data centers that host Vansah. For more information about security at those data centers, please go to the appropriate links below:

Vansah is hosted using (AWS), (Digital Ocean) and (MongoDB Atlas).

Application and Network Security:

The application and network security deployed  to support Vansah is protected by redundant firewalls and load balancers. Our data center providers are ISO 27001 certified to ensure confidential data constantly protected while maintaining optimal performance. We monitor all systems 24/7 for availability and performance related incidents to pro-actively troubleshoot and resolve issues. Many of our servers and network equipment are designed in a redundant way with automatic active failover.

Our applications feature industry security standards with encrypted storage, including backups .

Certification:

The Cloud Providers are responsible for managing the security of the cloud. They have been certified by third-party organizations and are compliant with the applicable laws and regulations. The list of such certifications and compliance statements can be found  in the links below:

Development and Access Practices:

Our teams follow the proven industry best practices achieving a high level of security and monitoring in our application code. To ensure a high code quality, we employ regular code reviews, revision control and change management. We also maintain our own secure framework as part of our stack to limit third-party dependencies and to manage critical code in a central place.

All access to data within Vansah is governed by access rights and user authentication. Operations and customer service policies follow many industries best practices limiting access to customer data. 

 If you need to raise a security related issue or bring to our attention a vulnerability which needs further investigation, please submit your issue here


Privacy

Vansah understands the importance and is committed to ensure the privacy of your personally identifiable information. For more information, please see our Privacy Policy, including Frequently asked questions about our Data Privacy.