Security

At Visualogyx®, our dedication to security is intrinsic to our operations. We’ve implemented rigorous security and privacy controls to ensure a safe platform.

Your Security is Our Priority

We align ourselves with SOC 2 compliance, which serves to mitigate potential risks to data integrity, confidentiality, and system availability. This compliance framework covers various aspects, including physical, technical, and administrative considerations.

SOC 2 Type II

The SOC 2 framework is a rigorous attestation that underscores our dedication to data security. It signifies that we have meticulous third-party assessment, focusing on designing and implementing controls relevant to security, availability, processing integrity, confidentiality, and privacy.

Security policies and documents

For access to our security policies, please visit our document trust center.

Data Security for the Visualogyx Platform

The Visualogyx platform is a testament to our commitment to safeguarding our customer’s sensitive data. Hosted on AWS, we employ state-of-the-art security practices, ensuring an environment of trust and reliability.

User Authentication

We use Auth0 for User Authentication (login), an ISO27001, ISO27018, and SOC 2 Type II enterprise-grade solution

Some of the Auth0 capabilities include:

End-to-End Encryption

User data is encrypted end-to-end. Visualogyx employs the TLS 1.3. protocol and RSA with 2048-bit key certificates for in-transit data encryption.

Data is encrypted at rest (databases and file storage) using Advanced Encryption Standard (AES-256), one of the strongest block ciphers available Encryption keys are rotated regularly.

Infrastructure Security

Our infrastructure configuration follows best practices, including:

Access & Change Control

Within our organization, we diligently manage and restrict internal staff access, maintaining a robust level of control. We’ve implemented rigorous software change control procedures to ensure that any modifications are executed within a structured framework, further bolstering the security of our operations.

Compliance with OWASP Recommendations

We adhere to the best practices and guidance set forth by OWASP (Open Web Application Security Project) to ensure the security of our systems.

Security of Our Software

Through a proactive approach, Visualogyx consistently places the utmost emphasis on fortifying the security of our software, underscoring the significance of trust and resilience, especially in the present landscape.

Vulnerability Disclosure Policy

Conducting security assessments on our systems without obtaining explicit written consent is considered unlawful and could lead to civil and criminal legal actions. We request that security researchers engage in any form of security testing only when granted authorization to do so.

If you happen to uncover a vulnerability within any of our products or services unintentionally and wish to bring it to our attention, we encourage you to inform us via email at contact@visualogyx.com
It’s important to note that Visualogyx does not operate a rewards program or offer “bug bounties” for vulnerability disclosures.