Security
VelSight is committed to maintaining the highest standards of security to protect your research data.
Note: This is a placeholder page. Detailed security documentation should be reviewed and approved by your security team.
Data Encryption
All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3.
Access Control
Role-based access control (RBAC) with multi-factor authentication (MFA) support.
Data Isolation
Multi-tenant architecture with complete data isolation between organizations.
Audit Logging
Comprehensive audit trails of all system activities and data access.
Infrastructure Security
Hosted on enterprise-grade cloud infrastructure with DDoS protection and WAF.
Regular Audits
Regular security assessments, penetration testing, and vulnerability scanning.
Security Measures
Network Security
- TLS 1.3 encryption for all data in transit
- Firewall protection and DDoS mitigation
- Regular security patches and updates
- Intrusion detection and prevention systems
Application Security
- Secure coding practices following OWASP guidelines
- Regular security code reviews
- Input validation and sanitization
- Protection against common vulnerabilities (XSS, CSRF, SQL injection)
Data Security
- AES-256 encryption at rest
- Encrypted backups with separate encryption keys
- Secure key management using HSMs
- Data retention and secure deletion policies
Access Security
- Multi-factor authentication (MFA)
- Role-based access control (RBAC)
- Principle of least privilege
- Session management and timeout controls
Incident Response
We maintain a comprehensive incident response plan to quickly identify, contain, and remediate security incidents. All security incidents are documented and reviewed.
Employee Security
- Background checks for all employees
- Regular security awareness training
- Secure development lifecycle training
- Strict access controls for production systems
Certifications & Compliance
[List your certifications when obtained, such as:]
- SOC 2 Type II (In Progress/Planned)
- ISO 27001 (In Progress/Planned)
- HIPAA Compliance (If applicable)
- GDPR Compliance
Reporting Security Issues
If you discover a security vulnerability, please report it to:
Email: [security@velsight.com]
We take all security reports seriously and will respond promptly.
Questions?
For questions about our security practices, please contact:
Email: [security@velsight.com]