Security at Vectary

Every day, thousands of people design and share projects created in Vectary. Your work is valuable, and we strive to ensure that your privacy and data are never compromised. Below are key measures we've put in place:

Vectary is ISO
27001 certified

ISO 27001 is the globally accepted standard for assessing the life cycle of an organization’s security practices. It is a rigorous assessment of both risk, compliance, and governance that verifies that an organization has a mature, well-managed approach to information security.

Vectary is SOC 2
certified

SOC 2 certification is a security standard for SaaS and cloud-based companies that ensures they manage customer data (information and the 3D files) responsibly and securely, across five principles: security, availability, processing integrity, confidentiality, and privacy.

Compliance

Vectary complies with ISO 27001, GDPR, and CCPA regulations and is SOC 2 certified. These certification matter because it provides Vectary users with proof that the platform has rigorous controls in place to safeguard sensitive information, critical for businesses handling proprietary date online. Here is an overview of our security practises:

Data

  • Hosted at Amazon Web Services (AWS) facilities as protection against single data center failures.
  • Separation of production, staging, and development networks.
  • Classified data is encrypted and securely stored/managed.

Product

  • Delivery practices ensure a safe, reliable, and rapid roll-out of changes.
  • We conduct regular vulnerability scans and penetration tests.
  • An incident management process is in place to handle security breaches.

Infrastructure & Network

  • Use TLS to secure data transport and HTTP Strict Transport Security to defend against downgrade attacks.
  • Network segmentation is a key part of our security strategy.
  • Our hosting environment ensures data security and availability.

Operations

  • User data is stored at multiple AWS data centers and is continuously backed up.
  • Risk assessment strategy and methodology adhere to a rigorous access management principle.

Organization

  • Mandatory security training for all.
  • Maintain inventory of all networks, services, servers, and devices.
  • A dedicated Information Security Team ensures the protection of customer data.

Enterprise readiness

  • Enterprise plan users have additional features to provide customization and privacy, including Single sign-on (SSO) and Role-Based Access Control (RBAC).

If you have any security concerns, feel free to reach out at security@vectary.com