Security

VelSight is committed to maintaining the highest standards of security to protect your research data.

Note: This is a placeholder page. Detailed security documentation should be reviewed and approved by your security team.

Data Encryption

All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3.

Access Control

Role-based access control (RBAC) with multi-factor authentication (MFA) support.

Data Isolation

Multi-tenant architecture with complete data isolation between organizations.

Audit Logging

Comprehensive audit trails of all system activities and data access.

Infrastructure Security

Hosted on enterprise-grade cloud infrastructure with DDoS protection and WAF.

Regular Audits

Regular security assessments, penetration testing, and vulnerability scanning.

Security Measures

Network Security

  • TLS 1.3 encryption for all data in transit
  • Firewall protection and DDoS mitigation
  • Regular security patches and updates
  • Intrusion detection and prevention systems

Application Security

  • Secure coding practices following OWASP guidelines
  • Regular security code reviews
  • Input validation and sanitization
  • Protection against common vulnerabilities (XSS, CSRF, SQL injection)

Data Security

  • AES-256 encryption at rest
  • Encrypted backups with separate encryption keys
  • Secure key management using HSMs
  • Data retention and secure deletion policies

Access Security

  • Multi-factor authentication (MFA)
  • Role-based access control (RBAC)
  • Principle of least privilege
  • Session management and timeout controls

Incident Response

We maintain a comprehensive incident response plan to quickly identify, contain, and remediate security incidents. All security incidents are documented and reviewed.

Employee Security

  • Background checks for all employees
  • Regular security awareness training
  • Secure development lifecycle training
  • Strict access controls for production systems

Certifications & Compliance

[List your certifications when obtained, such as:]

  • SOC 2 Type II (In Progress/Planned)
  • ISO 27001 (In Progress/Planned)
  • HIPAA Compliance (If applicable)
  • GDPR Compliance

Reporting Security Issues

If you discover a security vulnerability, please report it to:
Email: [security@velsight.com]
We take all security reports seriously and will respond promptly.

Questions?

For questions about our security practices, please contact:
Email: [security@velsight.com]