How secure is my data in the Vaultastic cloud?
Vaultastic ensures the highest level of security with a comprehensive security checklist that goes beyond basic cloud security configurations. The solution continuously monitors for potential threats and provides closed-loop feedback to mitigate risks effectively. Built on the industry-leading AWS cloud infrastructure, Vaultastic builds on the cloud’s shared security model. AWS offers security OF the cloud, […]
What security measures does Vaultastic use to protect my data?
Vaultastic employs a robust, multi-layered security framework based on the cloud’s shared security model to safeguard your data. It adheres to cybersecurity guidelines from several industry regulatory bodies, ensuring compliance and protection. Vaultastic leverages a public cloud platform that guarantees 11 9’s of data durability, with an in-built disaster recovery (DR) site, alleviating concerns about […]
Is Vaultastic tested, audited and certified by an independent body?
Yes, Vaultastic is thoroughly tested, audited, and certified by independent bodies. As a cloud-native solution running entirely on the AWS public cloud, Vaultastic leverages AWS’s shared security model. Mithi’s solutions undergo an annual audit by AWS as part of their Foundational Technical Review (FTR) program, ensuring adherence to strict security, performance and reliability standards. Additionally, […]
Does Vaultastic support role-based access?
Yes, Vaultastic supports role-based access as part of its robust security framework. This ensures that only authorized personnel can access specific data or perform certain actions based on their roles. Besides role-based access, Vaultastic’s security management practices include continuous monitoring, automated threat detection, frequent audits, and ongoing system upgrades. Additionally, regular training on security best […]
How can I ensure that my archived data is only accessible to authorized users?
Vaultastic enforces a zero-trust policy, where all user access is disabled by default. As the administrator, you have full control to define roles and assign role-based access to users according to your organization’s policy. Through the Vaultastic admin panel and dashboard, you can easily monitor and manage access rights, ensuring that only authorized individuals have […]
What happens to my data if Vaultastic experiences a security breach?
Vaultastic operates on the AWS cloud, following a shared security model where AWS ensures the security OF the cloud infrastructure, and Vaultastic provides security IN the cloud. Vaultastic employs multi-layered security measures, including encryption, access control, and auditing, to protect your data. In the unlikely event of a security breach, the robust encryption in place […]