Vendor Due Diligence
Security, compliance, and operational transparency information
Company Information
Security Overview
- All user and tenant information is encrypted in transit and at rest
- Hashing and encryption standards meet or exceed current industry best practices
- User access is managed through a modernized system. Each tenant is manually created to ensure proper validation
- Tenant administrators are responsible for creating and managing their own user accounts
- Regular security patching and updates are performed in accordance with NIST and CISA standards
- Continuous tracking and remediation of CVEs (Common Vulnerabilities and Exposures) are conducted
Data Protection
- All data is stored using trusted and well-known database solutions
- Databases are backed up regularly to ensure availability and disaster recovery capability
- User and tenant data deletion is permanent once executed by the tenant administrator
- ThreatShield does not sell or share user data with any third parties
Privacy and Compliance
- GDPR, CCPA, and HIPAA regulations do not apply to the current scope of ThreatShield operations
- ThreatShield maintains strict internal controls to ensure privacy and data integrity
- All customer data is fully controlled by the tenant administrator
Business Continuity and Disaster Recovery
- A formal disaster recovery plan exists and can be shared in full upon request via email: vdd@cybersecure.ai
- Regular reviews and updates are conducted to ensure readiness and effectiveness
Legal and Liability
- Legal and liability documentation, including service terms and agreements, are available upon request at vdd@cybersecure.ai
Compliance Commitment
- ThreatShield adheres to best practices outlined by NIST and CISA
- Continuous improvement and monitoring processes are in place to maintain operational security and reliability
Need More Information?
For detailed documentation, disaster recovery plans, or additional compliance information, please contact us:
Contact VDD Team