Skip to main content

You are using an outdated browser. Please upgrade your browser to improve your experience and security.

Compliance

VEERUM undergoes independent verification of application security, availability, and compliance controls. VEERUM offers enterprise-level security features:

ISO 27001

Image of man on a laptop overlaid with ISO 27001 certification logo.

ISO 27001 standard sets requirements for an information security management system (ISMS). VEERUM achieved ISO/IEC 27001:2013 certification in 2021.

View the certificate

Image of man on a laptop overlaid with ISO 27001 certification logo.

Security

VEERUM offers enterprise-level security features:

Network isolation and access

Logical access controls are in place to control access to the VEERUM application, including password protection and multi-factor authentication for high privilege access to the supporting systems and infrastructure. Secure Shell (SSH) authentication is enabled and access to production servers is restricted through the use of SSH keys.

Encryption in transit and at rest

All network traffic is encrypted using Transport Layer Security (TLS). For VEERUM databases, data at rest is encrypted in data stores.

Systems operations

Configuration management processes, including patch management, are in place to confirm security of systems and roll back capability.

Data backup and recovery

VEERUM generates daily and weekly snapshots of critical system data and components on an automated schedule. The snapshots are replicated to multiple different locations to provide disaster recovery capabilities.

Change management

VEERUM uses dedicated, separate environments to develop and test changes before they are authorized for release to production. Only application changes which have passed review and testing processes are considered for deployment to production.

This site uses cookies to provide you with a great user experience. Learn about and get full control of cookie use here.