Vansah offers 3 layers of application security
Ensures maximum security in data transfer. Prevents login and password theft. All communications to and from the Vansah’s application are encrypted in bank-grade security protocol.
Backed by Testpoint, all our systems are continuously monitored for security, availability and performance. Today Vansah operates a highly scalable and redundant infrastructure backed by a 99.99% uptime service level agreements.
Vansah employs Testpoint‘s Security’s industry-leading testing solution to regularly assess, verify and safeguard our customers confidential data from security breaches and hacker attacks. Testpoint conducts rigorous and ongoing security and application testing for many fortune 500 companies and small to medium size organisation including Vansah.
Regular Secure Backups
Vansah incorporates the latest industry standards when it comes to real-time backups, recovery and software deployment processes. This provides confidence to our customers that data is regularly encrypted, backed up and available.
Application and Network Security:
The application and network security deployed to support Vansah is protected by redundant firewalls and load balancers. Our data center provider is ISO 27001 certified to ensure confidential data constantly protected while maintaining optimal performance. We monitor all systems 24/7 for availability and performance related incidents to pro-actively troubleshoot and resolve issues. Many of our servers and network equipment are designed in a redundant way with automatic active failover.
Our applications feature industry security standards with encrypted storage including backups .
Development and Access Practices:
Our teams follow the proven industry best practices achieving a high level of security and monitoring in our application code. To ensure a high code quality, we employ regular Testpoint code reviews, revision control and change management. We also maintain our own secure framework as part of our stack to limit third-party dependencies and to manage critical code in a central place.
All access to data within Vansah is governed by access rights and user authentication. Operations and customer service policies follow many industries best practices limiting access to customer data.