Trust & security

Our goal is to create the most trusted platform in the world, and your trust is central to everything we do. Our products, policies, processes, and systems are designed to protect your rights and your data.

/images/trust-and-security_top.webp)

Data centers

Our systems are hosted in Previder data centers. These data centers use leading physical and environmental security measures.

Quality assurance

Changes to vPlan's code undergo a series of automated tests and a manual review. Once code changes pass the automated test system, they are first deployed to a staging environment where vPlan employees can test the changes before they are finally rolled out to the production environment and our customers. We also add a specific security review for particularly sensitive changes and features.

ISO 27001 certification

At vPlan, your data security is our top priority. We are committed to protecting your information, always and everywhere. vPlan has successfully achieved the prestigious ISO 27001 certification for Information Security Management, which means your valuable data receives the highest level of protection.
Iso certificering

Data encryption

vPlan uses high-quality encryption and hashing.

  • For traffic encryption, we use at least TLS 1.2 with modern cipher suites.
  • Sensitive information is encrypted at rest with AES-256 or better.
  • Login credentials are hashed using a modern hash function that uses a salt.

Emergency recovery and backups

vPlan is committed to providing continuous and uninterrupted service to all its customers. We consistently back up customer environments daily. All daily backups are encrypted and distributed to different locations, where they are retained for one month.

Our emergency recovery plan is tested at least once a year to assess its effectiveness and to align our teams with their responsibilities in the event of a service interruption.

Availability

We are committed to keeping vPlan continuously available for you and your teams. Our systems have built-in redundancy to withstand failures and are constantly monitored to keep your work uninterrupted.

Privacy

At vPlan, privacy is of utmost importance. Our privacy policy ensures that personal data collected during your interaction with our website and apps is securely stored and used according to our guidelines. We strictly comply with laws and regulations to ensure the confidentiality of your data.

Security at the vPlan office

vPlan is a cloud-based company, with no part of our infrastructure on-premise. Our physical office security includes access control and alarm systems based on personal identification.

Support

vPlan automatically logs user events. This way, you know who performed which action and when.

vPlan never asks for your login details. Our support team may request a Support token. You can provide this temporary token, giving our support team temporary access to your environment. This often allows us to help you even faster.

Events performed via a support token are logged with a unique identifier, making it clear that this action was not performed by the regular user.

Security features

Data security

Our people and systems can only access the data needed for their work. We store your data at Previder data centers. These data centers use leading physical and environmental security measures.

Penetration testing and audits

We assess our software and infrastructure through peer reviews and penetration tests for security issues. We also conduct annual internal and external audits of our Information Security Management System (ISMS).

High availability

We are committed to keeping vPlan continuously available. Our systems have built-in redundancy to withstand failures and are constantly monitored to keep your work uninterrupted.

Encryption

We keep your data secure during transport and at rest. During transport, data is only accessible via TLS/SSL, and at rest, data is encrypted with AES-256 or better.

Monitored and resilient

Our threat detection, logging, and alerting systems notify our response teams of potential incidents.

User roles and permissions

Users can be assigned different roles, allowing them to do what is necessary. You can set access to plan boards and views.

Phased releases

We only release software after it has been qualified in development and staging environments.

Backup policy

We back up your environment daily. Backups are encrypted and distributed to different locations, where they are stored for one month.