The security of your data is important to us. That’s why we can’t go into too much detail here for security reasons, seriously. We can tell you Vision6 takes a Security-First approach to our systems and practices, based on international protocols and standards. We adhere to industry best practices and you can be confident that your data is always secure with us.
- We continually work to improve the security of our application. Our product and infrastructure are designed from the ground up to be secure, and we are always looking to take advantage of new techniques and browser features that can help.
- 2 Factor Authentication is available for all customers and IP address restrictions can also be configured as an extra level of access control for both the application and the API.
- For customers that need to access more than one account, we help to provide full visibility over your configuration through the use of your profile in conjunction with user roles to define how an account can be accessed.
- Our application is fully encrypted over HTTPS using TLS and is up to date with the most modern cryptography standards.
- Vision6 stores your data based on the location of your account, including all backups and disaster recovery systems, in either the United States or Australia.
- Your data will always stay in one of these countries, based on where your account was created.
Data Integrity & Disaster Recovery
- Your data is kept separate from other users, where each account is logically separated to make sure that each account is secure and consistent.
- Backups of your data are made at least every 24-hours and protected by industry-standard encryption, stored in local as well as multiple off-site locations.
- We store redundant copies of your data to ensure integrity and resilience. Our disaster recovery systems are designed so that we can quickly recover from the loss of a data center or entire region, and we test our disaster recovery plans regularly according to a schedule.
Network & Data Centre Security
- Our network infrastructure is designed to prevent intrusion through segmentation and other best practice techniques such as highly restrictive firewalls.
- We have DDOS (Distributed Denial-Of-Services) plans in place and actively work with our networking providers to mitigate any problems.
- Our Data Centre providers manage security for the facilities we use and provide continual monitoring.
- The networks used in our office and by our staff are continually monitored and highly restricted.
- We have very strict internal security procedures including various physical security measures, anti-virus, and spam filtering, firewalls, network security, and operating system security.
Credit Card Security
- Our payment providers are fully PCI compliant and meet the most stringent level of certification available in the payments industry. To accomplish this, they make use of best-in-class security tools and practices to maintain the highest levels of security. We don’t handle credit cards ourselves.