Vestlane
ic-menu icon

Security at Vestlane

Security Image Asset

Vestlane takes security and data protection extremely seriously. We apply security controls across all areas of our company, and perform mandatory security trainings for our employees. We're SOC2 certified.

Trusted by

Logo
Logo
Logo
Logo
Logo
Logo

Vestlane performs vulnerability scanning at key stages of its software development lifecycle - on its own codebase as well as on dependencies. We have implemented controls to enforce and monitor best practices in identity and access management and infrastructure management.

ic-lock-key icon
Encryption

Data and documents always encrypted in transit and at rest.

ic-monitor icon
Monitoring

Our systems are designed to ensure high availability and adherence to stringent SLAs.

ic-upload icon
Backups

Documents are backed up daily, data even hourly.

ic-folders icon
Data Replication

Backups are replicated in multiple data centers across Germany.

Looking to report a security concern?

If you believe you've discovered a potential vulnerability, please let us know by emailing us at [email protected]

We will acknowledge your email within one week. We are always open to feedback, questions, and suggestions.

image-107
image-111
image-111

In case you discover a bug in our website or product, please reach out to our support via

[email protected]