Always safe, secure and in the Cloud
Thousands of users trust Vincere every second, everyday to keep their data safe and carry out business-critical operations that help turn profits.
That’s why we’ve taken a no-nonsense philosophy when it comes to security, reliability and privacy of our Cloud-native applications.
Scanning & Assessment
To provide independent assurance on our commitment to security, we engaged Bishop Fox - a third-party security specialist and certified Google Partner - to assess the security and vulnerabilities of our application and Cloud infrastructure across these four key areas.
We use Amazon Web Services (AWS) which manages a comprehensive control environment that includes the necessary policies, processes and control activities for the delivery of each of the web service offerings in a secure manner, so you can be assured that all your data is safe in the Cloud.
AWS is compliant of Industry Standard Accreditations:
SAS70 Type II - Detailed Service Auditor Report
PCI DSS Level 1 - PCI Data Security Standard
ISO 27001 - Certification for Security Management System
FISMA - Government Agency's standard for Federal Information Security Management Act
Physical security & access of AWS data centers:
We utilise innovative architectural and engineering approaches, covering Fire Detection and Suppression, Power, Climate and Temperature, and Management. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilising video surveillance, intrusion detection systems, and other electronic means. Authorised staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorised staff.
Data center locations
Our deployments are hosted in 5 locations. We use top tier AWS data centers, strategically located close to you to ensure the highest performance.
Data & network security
Protection of data from unauthorised parties both from within the organisation and externally:
Data Read/View is configured within the Vincere software depending on user permission settings.
Only Super Users will be able to export data out of the system.
Some of our clients uses USB Lock to ensure that no data can be exported out from the computer.
Internet access to any social media disc drive (Box, Dropbox, MediaShare etc) can be made IP restricted.
To protect against data download externally, IP restrictions can be provisioned within the internal firewall.
We take significant protection against traditional network security issues to deter any attacks against your data including:
Distributed Denial of Service (DDoS) Attacks
In order to protect and maintain the accuracy of your data against malicious threats and attacks, we adhere strictly to the Data Leak Prevention (DLP) procedure.
Encrypted over HTTPS (SHA2 encryption) – a protocol that provides secure communications through the internet. Rest assured that your activities are as secure as internet banking.
Data at rest + Data at transit protection via encryption and cleansing.
Systematically, we create logs on all output channels for periodical checks.
We have strict backup procedures and have put in place recovery plans to ensure quick restoration with minimal loss of data. When it comes to disaster recovery and your data, our mission is to keep the Vincere Cloud & services running at all times with the least disruption – and that’s our promise to you.