Cyviz Trust Center
Transparency and trust are at the core of how we operate. Explore the measures Cyviz takes to safeguard your data and maintain compliance.
See section
Resources
Cyber Essentials - Certificate of Assurance
Latest Pen test summary
Privacy Policy
DPA
FAQs
How does Cyviz handle vulnerability management?
We conduct regular vulnerability scanning across our
infrastructure and applications. An independent third party
performs penetration testing at least annually. Critical and
high-risk findings are tracked through to resolution with
defined SLAs.
Does Cyviz have a formal incident response process?
Yes. Cyviz maintains a documented Incident Response Plan that
is tested periodically through tabletop exercises. Affected
customers are notified promptly in accordance with our contractual
obligations and applicable regulations. Lessons learned are
documented and fed back into our security programme.
How does Cyviz manage access to systems and data?
We enforce the principle of least privilege across all systems.
Personnel are assigned unique access IDs, and multi-factor
authentication is required for access to production environments.
Access reviews are conducted regularly, and access is revoked
promptly upon role changes or termination.
How does Cyviz vet employees and contractors?
Background checks are performed on all new hires in accordance
with local laws. All personnel complete security awareness training
upon onboarding and annually thereafter. Personnel handling
classified or sensitive environments undergo additional vetting
as required by the relevant authority.
Does Cyviz have a Business Continuity and Disaster Recovery plan?
Yes. Cyviz maintains a formal Business Continuity and Disaster
Recovery Plan that is tested periodically. Automated backups are
performed and backup restoration is validated at least annually
to ensure data integrity and availability.
How does Cyviz manage third-party and subprocessor risk?
All vendors are assessed in accordance with our Vendor Risk
Management Policy before engagement. SOC 2 reports or equivalent
assurance documentation are collected and reviewed at least
annually. Our current subprocessors are listed in the
Subprocessors section of this Trust Center.
Can Cyviz solutions operate in multi-classification environments?
Yes. Cyviz solutions are specifically designed for
multi-classification environments, supporting role-based access
and data segregation for sensitive and classified operations. Our
technology is deployed in over 1,500 control rooms and operations
centres globally, including NATO-aligned defence environments.
How can I request additional security documentation?
You can request any of our security documents — including our
SOC 2 report, penetration test summary, and certification details —
directly from the Resources section of this Trust Center. Our team
will review and respond to your request promptly.
Subprocessors
Netsecurity Security Operations
SOC
Github
Keeper Security Inc
Password Management
Linear
Microsoft
Cloud services. Office365, Exchange, SharePoint, Teams, Dynamics365 FO and Dynamics365 CRM, Azure Cloud services, Endpoint OS
Monitoring
Continuously monitored by Secureframe
