Vidscrip Security Information

At Vidscrip, security is at the core of everything we do. We are committed to protecting the confidentiality, integrity, and availability of your data through a robust, multi-layered approach. Our platform is built on industry-leading practices and is regularly audited to ensure compliance with SOC‑2, HIPAA, and other relevant standards.

Our Commitment to Security


Data Protection:

We use state-of-the-art encryption for data in transit (TLS) and at rest. Role-based access controls and multi-factor authentication (MFA) are enforced across our systems to prevent unauthorized access.

Infrastructure Security:

Our production environment is hosted on AWS, leveraging services like Virtual Private Cloud (VPC), GuardDuty, AWS WAF, and NAT Gateways. These services ensure that our network is securely segmented and continuously monitored for potential threats.

Continuous Monitoring & Response:

Using advanced monitoring tools such as Datadog, New Relic, and Sentry, we continuously assess system performance and detect anomalies. A dedicated incident response team is on standby to address any potential security incidents promptly.

Vulnerability Management:

Regular vulnerability scans, penetration testing, and proactive remediation efforts help us maintain a resilient security posture.

Compliance & Transparency:

Our security practices are designed to meet the highest compliance standards. We are committed to ongoing improvements and transparency through our publicly accessible Trust Center.

Key Security Measures


Encryption

  • Data in Transit: Secured with industry-standard TLS protocols.
  • Data at Rest: Encrypted using AWS KMS and other secure methods to protect sensitive information.


Access Controls

  • Role-Based Access: Strict access permissions ensure that only authorized personnel can access sensitive data.
    Multi-Factor Authentication (MFA)
    : Additional security layers to safeguard user and system access.

Infrastructure Segregation

  • AWS VPC & Subnets: Our environment is segmented into public and private subnets, reducing exposure of critical systems.
  • Security Groups & ACLs: Fine-grained control of traffic at both the instance and subnet levels.

Monitoring & Incident Response

  • Continuous Monitoring: Real-time insights through Datadog and New Relic.
  • Incident Response: Comprehensive procedures are in place to swiftly address and mitigate security incidents.

Trust and Transparency

We believe in fostering trust through transparency. For a more detailed look at our security protocols, audit results, and compliance efforts, please visit our Trust Center.

Visit our Trust Center 

Contact Us

If you have any questions or concerns regarding our security practices, please reach out to our Security Team.