Security Overview

This page summarizes SecVektor’s security posture for the marketing site and demo materials. If you engage with SecVektor as a customer, a separate security and data protection schedule applies.

Data Handling

Access Control

Hosting & Transport

Logging & Monitoring

Vulnerability Management

Business Continuity

Customer Engagements

When services are provided under contract, security measures (e.g., data segregation, encryption, audit logging, and access controls) are defined in the applicable agreement and security schedule.

Last Updated: 2024-12-17