This is a solution we customize based on your organizational needs. Let's discuss what works the best for your organization.
We believe that a partnership in security is essential. A shared responsibility between your organization and ours requires input from your organization's technical experts. Our architects, security experts, and operations personnel will work with your team to secure your environment. We each have a role to play in protecting your application's data and infrastructure.
vTech Security Management
Our security and compliance services are designed to help protect your information and physical resources. This effort focuses on ensuring that vTech has controls in place to manage the risk of interruptions that may impact our commitments to you.
Strong Security Team
Setting objectives for information security management is the responsibility of our security team. This includes setting policies in the following areas:
This policy sets a risk management framework that is in accordance with your business requirements and relevant laws and regulations to establish vTech's direction and support needed for your information security system.
Asset Management focuses on achieving and maintaining the appropriate protection of vTech’s critical infrastructure, required for its service delivery.
Human Resources Security
To ensure that all vTech’s employees, contractors and third party users are suitable for the roles for which they are considered, we have put in place Human Resources Security, overseeing that each member understands their responsibilities and that necessary controls are established and followed.
Physical and Environmental Security
To prevent unauthorized physical access, damage and interference to our organization's premises and information, controls and procedures have been developed in conjunction with our partner datacenters to ensure the integrity of these facilities.
We have established controls and procedures to ensure that only approved users are granted access to appropriate systems and resources.
Information Security Incident Management
We have put in place policies and processes to ensure information security events and weaknesses are communicated in a manner that allows timely corrective action.
Security Vulnerability Reporting
Our team gives immediate attention to any report of security issues. We have designed our infrastructure and services for security, to protect our customers and their data. If, however, you believe there is anysecurity vulnerability with any of our products or infrastructure, please let us know immediately so we can take corrective action.
We Follow ISO Standards For Security
Our security model consists of four mainstages: Plan, Implement, Check, and Correct, as shown in the image. It is a cyclic process always evolving to meet new challenges.
Our Customer Security Program combines our expertise with technology and services. Our model is built on the foundation of ISO standards. This results in an individualized service level for you and your business goals.
We maintain the highest security standards to build a trusted relationship with our customers, whether using dedicated infrastructure or on our Public Cloud.
Contact us to find out more about our comprehensive approach to security.
Information Security Controls
vTech uses the best practices described in ISO 27002 security standard to execute the plans defined in the control objectives. This standard is recognized globally as the most comprehensive framework for establishing and maintaining information security best practices within an organization.
In the interest of security, we do not describe them in detail on publicly-available documents, as these controls are essential to our security posture.
For further insight into these controls, customers and prospects can view further information available in our confidentiality agreements.
Compliance and Validation
We implement an important collection of audit and review activities to provide assurances for efficient operating practices. These are aligned with the policies set by the security organization and in compliance with validation activities. Contact us to learn more about our compliance certifications...
Significant resources have been invested to ensure we can detect and respond to security events and incidents that impact infrastructure. This function involves the underlying networking and physical environment which includesmonitoring internal networks and employee access to customer environments. It does not involve actively monitoring individual customer solutions.
Security operations ensure that:
- Incidents are acknowledged in a timely fashion and intelligence is propagated to the relevant parties.
- Remedial actions are determined and executed.
- Root cause analyses are performed.
- Lessons learned are disseminated to the policy and planning operations.
- These functions drive the continuous improvement of the practices and models our security management system employs to protect the infrastructure.
Secure application architecture and security management disciplines are both required, within the service provider, for an efficient alleviation of the risks of a cloud solution. Security Management from vTech provides a coordination of these entities: security organization, security controls and compliance, and security operations.
A mixture of a secure application architecture and security management disciplines within the service provider are required for an efficient alleviation of the risks of a cloud solution. Security Management at vTech involves the coordination of the security organization, security controls and compliance and security operations.