Always safe, secure and in the Cloud

Thousands of users trust Vincere every second, every day to keep their data safe and carry out business-critical operations that help turn profits. That’s why we’ve taken a no-nonsense philosophy when it comes to security, reliability and privacy of our Cloud-native applications.

“As a trusted Cloud provider, nothing is more important to our company than protecting the data assets of our customers.”

Bernie Schiemer, CEO & Founder of Vincere


icon_ security


We work behind the scenes to keep security top-notch




We’re committed to keeping your data private and we’ve got the badges to prove it.

Disaster Recovery


Disaster Recovery

We’re always in control, we’re ever-ready




We go to great lengths to ensure that it’s always up, always on.



We use Amazon Web Services (AWS) which manages a comprehensive control environment that includes the necessary policies, processes and control activities for the delivery of each of the web service offerings in a secure manner, so you can be assured that all your data is safe in the Cloud.

AWS is compliant of Industry Standard Accreditations:

    • SAS70 Type II – Detailed Service Auditor Report
    • PCI DSS Level 1 – PCI Data Security Standard
    • ISO 27001 – Certification for Security Management System
    • FISMA – Government Agency’s standard for Federal Information Security Management Act.
Physical Security & Access of AWS data centres:

We utilise innovative architectural and engineering approaches, covering Fire Detection and Suppression, Power, Climate and Temperature, and Management

Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilising video surveillance, intrusion detection systems, and other electronic means. Authorised staff must pass two-factor authentication a minimum of two times to access data centre floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorised staff.


icon-network securityNETWORK SECURITY

We take significant protection against traditional network security issues to deter any attacks against your data including:

  • Distributed Denial of Service (DDoS) Attacks
  • IP Spoofing
  • Packet Sniffing
  • Port Scanning

img_network security

icon_data securityDATA SECURITY

Protection of data from unauthorised parties both from within the organisation and externally:

  • Data Read/View is configured within the Vincere software depending on user permission settings.
  • Only Super Users will be able to export data out of the system
  • Some of our clients use USB Lock to ensure that no data can be exported out from the computer.
  • Internet access to any social media disc drive (Box, Dropbox, MediaShare etc) can be made IP restricted
  • To protect against data downloads externally, IP restrictions can be provisioned within the internal firewall.

img_data security


In order to protect and maintain the accuracy of your data against malicious threats and attacks, we adhere strictly to the Data Leak Prevention (DLP) procedure.

  • Encrypted over HTTPS (SHA2 encryption) – a protocol that provides secure communications through the internet. Rest assured that your activities are as secure as internet banking.
  • Data at rest + Data at transit protection via encryption and cleansing.
  • Systematically, we create logs on all output channels for periodical checks.

img_data intergrity


Awarded the prestigious Japan Privacy Mark, the global gold standard in data protection regulation

Part of Microsoft’s Partner Network, we get your business up and running quickly and stay that way.

World class SSL certificate and encryption to secure online transactions and assure code integrity


We have strict backup procedures and have put in place recovery plans to ensure quick restoration with minimal loss of data. When it comes to disaster recovery and your data, our mission is to keep the Vincere Cloud & services running at all times with the least disruption – and that’s our promise to you.

icon_backupBACKUP TYPES



Store backup data on each Server instance

Daily from Monday to Friday


Cross-instance backup to maintain important service availability (file server)

Daily from Monday to Friday


Centralize backup data for all instances after all slave backups completed (backup of backup)

Daily from Monday to Friday


Store important backup data to local server

Every Weekend


We strive to provide excellent uptimes for all our customers, no matter big or small.
Here is a report card of the monthly average of all hosted customer instance uptimes in the past 6 months.

For more info, visit our status page.

March 2018100%
Feb 2018100%
Jan 2018100%