Your Information
is Safe with Us!

At Vicarius, we are dedicated to not just providing the best vulnerability management platform but also an environment that keeps your data safe and private.

SOC 2 Type II Compliance

In order to maintain a secure environment, Vicarius has achieved SOC II compliance without exceptions. This means we follow strict guidelines that ensure our information security measures are robust and able to evolve with the changing requirements of data protection in the cloud.

Security Monitoring

efficiency.png

We have established secure processes regarding constant oversight across Vicarius’ digital and physical infrastructure. We monitor our networks for unusual system activity, authorized and unauthorized system configuration changes, and user privileges. Our security team is alerted to any anomalous activity so it can be immediately authenticated or contained and remediated. Alongside our technological precautions, every employee is required to take and pass a digital security and hygiene course on a yearly basis as well as maintain standards in line with current guidelines as recommended by the digital security community.

Robust Infrastructure

analysis.png

At Vicarius, all data is securely stored. We utilize Amazon Web Services (AWS) secured servers and encrypt stored data with an industry standard, one-way salted hash. Data is protected in transit using Transport Layer Security (TLS), ensuring that your information remains secure if hosts are compromised. Our physical locations have multiple secure access points that require proper credentials to enter. All employees must undergo data security training in order to gain and maintain network access. Endpoints are hardened by a Web Application Firewall (WAF). This increases resistance to common exploits that could interrupt application availability.

Confidentiality and Privacy

insight.png

We abide by AICPA’s generally accepted privacy principles (GAPP), and have numerous controls in place to protect Personal Identifiable Information (PII). All collected information is anonymized unless otherwise stated. All data processing is complete, accurate, timed, and authorized. We only collect data that pertains to the development of TOPIA and other Vicarius products. All our employees have signed Non-Disclosure Agreements regarding our proprietary technology and the data of our clients. All collected data is treated as critical and measures are in place to protect it against unauthorized loss, misuse, and alteration.

Trusted by
Trusted by
  • 1608014876830.jpeg

    Oren Ben Shalom

    Security Team Leader

  • Oshri.png

    Oshri Cohen

    CISO

  • roberto-martinez-director-tecnico-de-ingecom.jpeg

    Roberto Martinez

    CTO

  • 1516458150869.jpeg

    Russ Giggey

    Worldlink-us Infrastructure Specialist

  • bgu Ciso.png

    Yossi Gross

    CISO

  • Ivo.png

    Ivo Dimitrov

    CISO

  • Stefania.png

    Stefania Costa Cirillo

    IT Manager

  • Robust Visibility, Centralized Solution

    Topia provides visibility on my security posture when it comes to patch management and exposed vulnerabilities across the organization. It is key to have a central solution when there is an update that needs to be installed immediately on all endpoints.

  • Merge Security & IT to Remediate Threats

    Vicarius’s TOPIA enabled Adama to centralize and consolidate work between IT and security teams, leading to a more efficient patching workflow.

  • Simple and Effective Protection

    Not only is it easy to use, but it's also a solution I can trust to protect my company from vulnerabilities. Within a few minutes, the agent is deployed across my assets, and I get an immediate understanding of where I need to direct my patching efforts.

  • Vulnerability Remediation Made Easy

    This is a great program. It's easy to use, has a great GUI interface, and keeps all the Windows machines updated.

  • Comprehensive Vulnerability Management Platform

    We were looking for a vulnerability and patch management platform that was easy to deploy and lightweight. We decided that TOPIA was the way to go and have been satisfied with its performance so far. TOPIA enables us to work more efficiently. Vulnerabilities are assessed and remediated all with the same interface. And their support team is exceptional, attentive, and professional.

  • Close Patching Windows to Reduce Exposure

    Vicarius's advanced technology was able to protect us during the most vulnerable moment in our patching cycle. TOPIA kept VIP Security safe between patching windows with its proprietary Patchless Protection™ technology.

  • Straightforward and Easy

    Vicarius's proactive solution was able to predict threats across our organization faster and better than any other solution. TOPIA's cloud-based environment provided Telit with immediate feedback on their remediation efforts, critical for the new work-from-home (WFH) paradigm.

last_chanse_02.png

Start Closing Security Gaps

  • Risk reduction from Day 1
  • Fast set-up and deployment
  • Unified platform
  • Full-featured 30-day trial