top of page

VEERUM 3DVAULT security information

VEERUM 3DVAULT provides and upholds enterprise-level security

Computer mockups (2).png

Identity and access management

VEERUM uses the zero trust security model for identity and access management (IAM). As part of this model, VEERUM 3DVAULT includes the ability to define user groups, and upholds enterprise-level security to set user-specific access to features, and to monitor activity by accessing using logs. Admin users are able to set fine-grained permissions and analyze access to further refine permissions across logical access controls. The security strategy includes password protection and multi-factor authentication for access to the systems and infrastructure.

Encryption in transit and at rest

All network traffic is encrypted using Transport Layer Security (TLS). For VEERUM databases and datasets, data at rest is encrypted in data stores.

Systems operations

Configuration management processes, including patch management, are in place to confirm security of systems and roll back capability.

Data backup and recovery

VEERUM generates daily and weekly snapshots of critical system data and components on an automated schedule. The snapshots are replicated to multiple different locations to provide disaster recovery capabilities.
Disaster recovery strategies are in place to continuously validate and track the resilience of VEERUM 3DVAULT workloads following our recovery time objective (RTO) and recovery point objective (RPO) targets.

Change management

VEERUM uses dedicated, separate environments to develop and test changes before they are authorized for release to production. Only application changes which have passed review and testing processes are considered for deployment to production.

bottom of page