A secure environment for your data
BlueVoyant clients enjoy the peace of mind that comes with trusting a world-class cybersecurity team with industry-standard security controls.
We hold ourselves to the highest standards and have implemented company policies that help ensure the security of your data.
You can learn more about our Security Program and Capabilities by contacting a representative from our team at [email protected] who can address your security questions or concerns.
Request more information regarding our InfoSec Program Overview, Policy Summaries, Recent Penetration Test Summary, and more.
Keeping your data safe and secure is part of normal operations with BlueVoyant.
Our managed security services are designed and delivered with a commitment to data privacy and protection.
Our architecture is built on the principles of privacy by design.
We use technical controls to classify private information, ensuring it’s appropriately handled, encrypted, and if not needed for security operations, uningested in the first place.
SOC Type II Compliant
We meet the defined criteria for managing customer data based on the “Trust Service Principles Criteria and Illustrations.”
The American Institute of Certified Public Accountants (AICPA) evaluates an enterprise’s information systems that are relevant to security and availability. SOC 2 Type II reports on various organizational controls related to security, availability, processing integrity, confidentiality and privacy.
Policies and Standards
Our Functional Assessments allow you to target specific aspects of your security program. We evaluate granular areas like cloud security performance, fraud risk, security stacks and more.
Application Development Security
Asset Management Enforcement
Data Security and Information Lifecycle Management
Encryption and Key Management
Identity and Access Management Policy
Incident Management, E-Discovery and Cloud Forensics
Threat and Vulnerability Management Policy