Vestlane
ic-menu icon

Security at Vestlane

Security Image Asset

Vestlane takes security and data protection extremely seriously. We apply security controls across all areas of our company, and perform mandatory security trainings for our employees. We're currently completing our SOC2 certification.

Trusted by

Logo
Logo
Logo
Logo
Logo
Logo

Vestlane performs vulnerability scanning at key stages of its software development lifecycle - on its own codebase as well as on dependencies. We have implemented controls to enforce and monitor best practices in identity and access management and infrastructure management.

Additionally, we're in the final stages of completing our SOC2 certification, further solidifying our position as leaders in secure fund management solutions.

ic-lock-key icon
Robust Encryption

Data and documents always encrypted in transit and at rest.

ic-monitor icon
Continuous Monitoring

Our systems are designed to ensure high availability and adherence to stringent SLAs.

ic-upload icon
Frequent Backups

Documents are backed up daily, data even hourly.

ic-folders icon
Data Replication

Backups are replicated in multiple data centers across Germany.

Looking to report a security concern?

If you believe you've discovered a potential vulnerability, please let us know by emailing us at [email protected]

We will acknowledge your email within one week. We are always open to feedback, questions, and suggestions.

image-107
image-111
image-111

In case you discover a bug in our website or product, please reach out to our support via

[email protected]