Security Overview
This page summarizes SecVektor’s security posture for the marketing site and demo materials. If you engage with SecVektor as a customer, a separate security and data protection schedule applies.
Data Handling
- No production customer data is required or processed on this site. Demo interactions are limited to form submissions (name, email, company, role, message).
- Do not upload sensitive data. If sensitive data is inadvertently provided, you may request deletion at hello@secvektor.com.
Access Control
- Administrative access to site infrastructure is restricted to authorized personnel using least privilege.
- Multi-factor authentication is enforced on administrative accounts where supported.
Hosting & Transport
- Site assets are delivered over HTTPS. Ensure you access the site via a secure connection.
- Infrastructure providers (e.g., cloud/CDN) operate under their own security standards; no guarantees are made regarding their controls beyond their published policies.
Logging & Monitoring
- Basic logs may be collected for availability and abuse detection (e.g., IP, user agent, request metadata).
- No behavioral tracking for advertising is performed.
Vulnerability Management
- Dependencies and site assets are periodically reviewed and refreshed.
- Responsible disclosure is welcomed: report suspected vulnerabilities to hello@secvektor.com. Do not attempt exploitative testing without written approval.
Business Continuity
- Site availability is best-effort; this marketing/demo site is not intended for production workloads.
- Backups are maintained for site content configuration.
Customer Engagements
When services are provided under contract, security measures (e.g., data segregation, encryption, audit logging, and access controls) are defined in the applicable agreement and security schedule.
Last Updated: 2024-12-17