By clicking “Accept”, you agree to storing cookies on your device. View our Privacy Policy for more information.
Der Inhalt dieser Seite ist nur auf Englisch verfügbar. Wenn etwas unklar ist, kontaktieren Sie uns bitte unter +31 73 204 8800.

Security

Keeping our clients' data secure is an absolute top priority at VobeSoft. Our goal is to provide a secure environment, while also being mindful of application performance and the overall user experience.
VobeSoft platform dashboard

End-to-End Security

VobeSoft is hosted entirely on Dutch soil, adhering to strict certifications, providing end-to-end security and privacy. Together with our cloud service provider, we take proactive measures to ensure a secure infrastructure environment. For more specific details regarding the hosting certifications, please refer to https://acc-ict.com/onze-certificeringen.

Ready for your scaling business

99,5%

Uptime SLA

Real-time

Database replication

AES 256

Encryption

Data center security

VobeSoft customer data is hosted on tier 3+ datacenters on Dutch soil, and are certified with ISAE3402 Type II or SOC 2 Type II. Our datacenters maintain an impressive list of reports, certifications, and third party assessments to ensure complete and ongoing state-of-the-art data center security. The data centers themselves are secured with a variety of physical controls to prevent unauthorized access.

Application security

All VobeSoft web application communications are encrypted over TLS 1.2, which cannot be viewed by a third party and is the same level of encryption used by banks and financial institutions. All data for VobeSoft is encrypted at rest using AES-256 encryption. VobeSoft actively monitors performance and availability 24/7/365. We run automated security testing on an ongoing basis. We also contract a third party for penetration testing.

Infrastructure security

VobeSoft's infrastructure is hosted in a fully redundant, secured environment, with access restricted to operations support staff only. This allows us to leverage complete data and access segregation, firewall protection, and other security features.