Pricing
Contact
Login
Start Free Trial

Your Information
is Safe with Us!

At Vicarius, we are dedicated to not just providing the best vulnerability management platform but also an environment that keeps your data safe and private.

SOC 2 Type II Compliance

In order to maintain a secure environment, Vicarius has achieved SOC II compliance without exceptions. This means we follow strict guidelines that ensure our information security measures are robust and able to evolve with the changing requirements of data protection in the cloud.

Security Monitoring

efficiency.png

We have established secure processes regarding constant oversight across Vicarius’ digital and physical infrastructure. We monitor our networks for unusual system activity, authorized and unauthorized system configuration changes, and user privileges. Our security team is alerted to any anomalous activity so it can be immediately authenticated or contained and remediated. Alongside our technological precautions, every employee is required to take and pass a digital security and hygiene course on a yearly basis as well as maintain standards in line with current guidelines as recommended by the digital security community.

Robust Infrastructure

analysis.png

At Vicarius, all data is securely stored. We utilize Amazon Web Services (AWS) secured servers and encrypt stored data with an industry standard, one-way salted hash. Data is protected in transit using Transport Layer Security (TLS), ensuring that your information remains secure if hosts are compromised. Our physical locations have multiple secure access points that require proper credentials to enter. All employees must undergo data security training in order to gain and maintain network access. Endpoints are hardened by a Web Application Firewall (WAF). This increases resistance to common exploits that could interrupt application availability.

Confidentiality and Privacy

insight.png

We abide by AICPA’s generally accepted privacy principles (GAPP), and have numerous controls in place to protect Personal Identifiable Information (PII). All collected information is anonymized unless otherwise stated. All data processing is complete, accurate, timed, and authorized. We only collect data that pertains to the development of vRx and other Vicarius products. All our employees have signed Non-Disclosure Agreements regarding our proprietary technology and the data of our clients. All collected data is treated as critical and measures are in place to protect it against unauthorized loss, misuse, and alteration.

ABI_Logo_FullColor-Black.svg
samsung-logo-text-png-1.png
Bupa-logo_2022.png
Hewlett_Packard_Enterprise_logo.svg.png
2560px-Logo_DB_Schenker.svg.png
starbucks.png
exabeam.png
pizza-hut.png
sisense logo.png
Mitsubishi-logo.png
hardrock-cafe.png
yellowcard-logo.f231780.png
fastco.png
ALogo.png
Equinix_logo.svg.png
SE88358_logo_orig.png
Wendys-Logo.png
Earnix.png
1280px-Logotipo_Banco_Falabella.svg.png
img.png
ISH.png
ingram micro.png
e92plus.png
DACAS.png
Logo_EtekNovared_CMYK_baixa-01-e1565266938985.png
Kyndryl_logo.svg.png
Israeli Government.png
tlv municipality logo.png
#Testimonials
#Testimonials
  • sisence card2.png
    1608014876830.jpeg

    Oren Ben Shalom

    Security Team Leader

  • adama card.png
    Oshri.png

    Oshri Cohen

    CISO

  • ingecom card.png
    roberto-martinez-director-tecnico-de-ingecom.jpeg

    Roberto Martinez

    CTO

  • worldlink card.png
    1516458150869.jpeg

    Russ Giggey

    Worldlink-us Infrastructure Specialist

  • bgu card.png
    bgu Ciso.png

    Yossi Gross

    CISO

  • vp security card.png
    Ivo.png

    Ivo Dimitrov

    CISO

  • etekplus card.png
    Stefania.png

    Stefania Costa Cirillo

    IT Manager

  • Robust Visibility, Centralized Solution

    vRx provides visibility on my security posture when it comes to patch management and exposed vulnerabilities across the organization. It is key to have a central solution when there is an update that needs to be installed immediately on all endpoints.

    Learn more
  • Merge Security & IT to Remediate Threats

    Vicarius’s vRx enabled Adama to centralize and consolidate work between IT and security teams, leading to a more efficient patching workflow.

    Learn more
  • Simple and Effective Protection

    Not only is it easy to use, but it's also a solution I can trust to protect my company from vulnerabilities. Within a few minutes, the agent is deployed across my assets, and I get an immediate understanding of where I need to direct my patching efforts.

  • Vulnerability Remediation Made Easy

    This is a great program. It's easy to use, has a great GUI interface, and keeps all the Windows machines updated.

  • Comprehensive Vulnerability Management Platform

    We were looking for a vulnerability and patch management platform that was easy to deploy and lightweight. We decided that vRx was the way to go and have been satisfied with its performance so far. vRx enables us to work more efficiently. Vulnerabilities are assessed and remediated all with the same interface. And their support team is exceptional, attentive, and professional.

    Learn more
  • Close Patching Windows to Reduce Exposure

    Vicarius's advanced technology was able to protect us during the most vulnerable moment in our patching cycle. vRx kept VIP Security safe between patching windows with its proprietary Patchless Protectionâ„¢ technology.

    Learn more
  • Straightforward and Easy

    Vicarius's proactive solution was able to predict threats across our organization faster and better than any other solution. vRx's cloud-based environment provided Telit with immediate feedback on their remediation efforts, critical for the new work-from-home (WFH) paradigm.

    Learn more
last_chanse_04.png

Start Closing Security Gaps

  • Risk reduction from Day 1
  • Fast set-up and deployment
  • Unified platform
  • Full-featured 14-day trial
Start Free Trial!

Have questions?

By submitting this form, you agree to be contacted about vRx and other Vicarius products.

Vicarius develops an autonomous vulnerability remediation platform to help security teams protect their assets against software exploitation. Consolidating vulnerability assessment, prioritization, and remediation, Vicarius strengthens cyber hygiene and proactively reduces risk.
We're hiring!

Support

support@vicarius.io

Sales

sales@vicarius.io

Marketing

info@vicarius.io
Product
Product Overview
Vulnerability Management
Patch Management
Patchless Protection
Auto Actions
Reporting
Network Scanner
xTags
0-Day Detection
Solution
Solution Overview
Case Studies
Knowledge
Research Center
Apps & OS Patch Catalog
Videos
Articles
Docs
Company
About
Investors
vconnect
Trust
Careers
Pricing
Pricing
Compare
vRx vs. Automox
vRx vs. ManageEngine
vRx vs. Rapid7
vRx vs. Tenable
vRx vs. Tanium
vRx vs. RMMs
vRx vs. Vulcan
vRx vs. PDQ
vRx vs. Qualys
vRx vs. SentinelOne
vRx vs. BigFix

Copyright © Vicarius. All rights reserved 2022. Privacy Policy and Terms of Use