VINCERE TRUST

Always safe, secure and in the Cloud

Thousands of users trust Vincere every second, every day to keep their data safe and carry out business-critical operations that help turn profits. That’s why we’ve taken a no-nonsense philosophy when it comes to security, reliability and privacy of our Cloud-native applications.

“As a trusted Cloud provider, nothing is more important to our company than protecting the data assets of our customers.”

Bernie Schiemer, CEO & Founder of Vincere

Security

icon_ security

Security

We work behind the scenes to keep security top-notch

Accreditations

icon_accreditations

Accreditations

We’re committed to keeping your data private and we’ve got the badges to prove it.

Disaster Recovery

icon_disaster

Disaster Recovery

We’re always in control, we’re ever-ready

Availability

Bitmap

Availability

We go to great lengths to ensure that it’s always up, always on.

SECURITY

icon_security BEST-IN-CLASS DATACENTER

We use Amazon Web Services (AWS) which manages a comprehensive control environment that includes the necessary policies, processes and control activities for the delivery of each of the web service offerings in a secure manner, so you can be assured that all your data is safe in the Cloud.

AWS is compliant of Industry Standard Accreditations:

    • SAS70 Type II – Detailed Service Auditor Report
    • PCI DSS Level 1 – PCI Data Security Standard
    • ISO 27001 – Certification for Security Management System
    • FISMA – Government Agency’s standard for Federal Information Security Management Act.
Physical Security & Access of AWS data centres:

We utilise innovative architectural and engineering approaches, covering Fire Detection and Suppression, Power, Climate and Temperature, and Management

Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilising video surveillance, intrusion detection systems, and other electronic means. Authorised staff must pass two-factor authentication a minimum of two times to access data centre floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorised staff.

img_networksecurity

icon-network securityNETWORK SECURITY

We take significant protection against traditional network security issues to deter any attacks against your data including:

  • Distributed Denial of Service (DDoS) Attacks
  • IP Spoofing
  • Packet Sniffing
  • Port Scanning

img_network security

icon_data securityDATA SECURITY

Protection of data from unauthorised parties both from within the organisation and externally:

Internal:
  • Data Read/View is configured within the Vincere software depending on user permission settings.
  • Only Super Users will be able to export data out of the system
  • Some of our clients use USB Lock to ensure that no data can be exported out from the computer.
  • Internet access to any social media disc drive (Box, Dropbox, MediaShare etc) can be made IP restricted
External:
  • To protect against data downloads externally, IP restrictions can be provisioned within the internal firewall.

img_data security

GroupDATA INTEGRITY

In order to protect and maintain the accuracy of your data against malicious threats and attacks, we adhere strictly to the Data Leak Prevention (DLP) procedure.

  • Encrypted over HTTPS (SHA2 encryption) – a protocol that provides secure communications through the internet. Rest assure that your activities are as secure as internet banking.
  • Data at rest + Data at transit protection via encryption and cleansing.
  • Systematically, we create logs on all output channels for periodical checks.

img_data intergrity

ACCREDITATIONS

Awarded the prestigious Japan Privacy Mark, the global gold standard in data protection regulation

Part of Microsoft’s Partner Network, we get your business up and running quickly and stay that way.

World class SSL certificate and encryption to secure online transactions and assure code integrity

BACKUP SCHEDULES

We have strict backups procedures and have put in place recovery plans to ensure quick restoration with minimal loss of data. When it comes to disaster recovery and your data, our mission is to keep the Vincere Cloud & services running at all times with the least disruption – and that’s our promise to you.

icon_backupBACKUP TYPES

ICON_CALENDARSCHEDULE

SLAVE BACKUP

Store backup data on each Server instance

Daily from Monday to Friday

CROSS BACKUP

Cross-instance backup to maintain important service availability (file server)

Daily from Monday to Friday

MASTER BACKUP

Centralize backup data for all instances after all slave backups completed (backup of backup)

Daily from Monday to Friday

PERMANENT BACKUP

Store important backup data to local server

Every Weekend

AVAILABILITY

We strive to provide excellent uptimes for all our customers, no matter big or small.
Here is a report card of the monthly average of all hosted customer instance uptimes in the past 6 months.

For more info, visit our status page.

icon_calendarMonthICON_CALENDAR@12xUptime
May 2017100%
April 2017100%
March 2017100%
February 2017100%
January 2017100%
December 201699.78%