Industries
Industries
Industries
Resources
Resources
Resources


Security & Compliance
Overview
Security & Compliance
Overview
July 24, 2024
July 24, 2024
July 24, 2024
1. Our Commitment to Security
1. Our Commitment to Security
At Vance, we understand that securing your organization's knowledge and technical data is paramount. As your trusted AI copilot for equipment service, we've built our platform with security as a cornerstone, not an afterthought.
At Vance, we understand that securing your organization's knowledge and technical data is paramount. As your trusted AI copilot for equipment service, we've built our platform with security as a cornerstone, not an afterthought.
2. Why Trust Vance?
2. Why Trust Vance?
Defense-in-Depth Approach
Defense-in-Depth Approach
We implement multiple layers of security controls to protect your data. From encrypted storage to secure access controls, every aspect of our platform is designed with security in mind.
We implement multiple layers of security controls to protect your data. From encrypted storage to secure access controls, every aspect of our platform is designed with security in mind.
Industry-Leading Infrastructure
Industry-Leading Infrastructure
Rather than building on unproven technology, we leverage battle-tested infrastructure from world-class providers:
- Google Cloud Platform (Firebase)
- Pinecone Vector Database
- Anthropic's Claude (Generative AI model)
Rather than building on unproven technology, we leverage battle-tested infrastructure from world-class providers:
- Google Cloud Platform (Firebase)
- Pinecone Vector Database
- Anthropic's Claude (Generative AI model)
Continuous Security Evolution & Transparency
Continuous Security Evolution & Transparency
Security isn't a one-time checkbox for us—it's a continuous journey of monitoring, updating, and improving our protocols to stay ahead of emerging threats. We believe in complete transparency. Our customers always know where their data is stored, how it's protected, who has access to it, and how it's being used. This transparency builds trust and ensures accountability in our security practices.
Security isn't a one-time checkbox for us—it's a continuous journey of monitoring, updating, and improving our protocols to stay ahead of emerging threats. We believe in complete transparency. Our customers always know where their data is stored, how it's protected, who has access to it, and how it's being used. This transparency builds trust and ensures accountability in our security practices.
2. Infrastructure Security
2. Infrastructure Security
World-Class Storage Foundation
World-Class Storage Foundation
We've partnered with industry leaders to provide a robust and secure foundation for your data. Our primary storage solution leverages Firebase, powered by Google Cloud Platform's enterprise-grade security infrastructure. This ensures your data benefits from the same level of protection trusted by global organizations.
Key security features include:
Advanced encryption (AES-256) for stored data
TLS 1.3 encryption for data in transit
Automated backup systems with point-in-time recovery
Geographic data residency options
We've partnered with industry leaders to provide a robust and secure foundation for your data. Our primary storage solution leverages Firebase, powered by Google Cloud Platform's enterprise-grade security infrastructure. This ensures your data benefits from the same level of protection trusted by global organizations.
Key security features include:
Advanced encryption (AES-256) for stored data
TLS 1.3 encryption for data in transit
Automated backup systems with point-in-time recovery
Geographic data residency options
Intelligent Vector Storage
Intelligent Vector Storage
For our vector database operations, we utilize Pinecone's enterprise security architecture. This system maintains complete isolation between different organizations' data through a sophisticated tenant architecture. Every piece of information is protected with end-to-end encryption, ensuring your proprietary knowledge remains secure and private.
Learn more at Pinecone's Trust Center
For our vector database operations, we utilize Pinecone's enterprise security architecture. This system maintains complete isolation between different organizations' data through a sophisticated tenant architecture. Every piece of information is protected with end-to-end encryption, ensuring your proprietary knowledge remains secure and private.
Learn more at Pinecone's Trust Center
AI Processing Protection
AI Processing Protection
Our AI processing, powered by Anthropic's Claude API, adheres to strict security protocols and respects a no-customer-data-training policy. We maintain secure API communication channels and implement rigorous data handling policies. No processing data is persistently stored, and all interactions are monitored and logged for security purposes.
Learn more at Anthropic's Trust Center
Our AI processing, powered by Anthropic's Claude API, adheres to strict security protocols and respects a no-customer-data-training policy. We maintain secure API communication channels and implement rigorous data handling policies. No processing data is persistently stored, and all interactions are monitored and logged for security purposes.
Learn more at Anthropic's Trust Center
3. Comprehensive Data Protection
3. Comprehensive Data Protection
Your data's security is ensured through multiple protective layers. We implement enterprise-grade firewalls, DDoS mitigation, and advanced web application protection. Access to your information is strictly controlled through multi-factor authentication and role-based permissions, with detailed audit logging of all activities.
Your data's security is ensured through multiple protective layers. We implement enterprise-grade firewalls, DDoS mitigation, and advanced web application protection. Access to your information is strictly controlled through multi-factor authentication and role-based permissions, with detailed audit logging of all activities.
4. Privacy and Compliance
4. Privacy and Compliance
Our infrastructure providers maintain numerous certifications including SOC 2, ISO 27001, and GDPR compliance. We're committed to meeting and exceeding industry standards for data protection, with a clear roadmap for expanding our compliance certifications as we grow.
Our infrastructure providers maintain numerous certifications including SOC 2, ISO 27001, and GDPR compliance. We're committed to meeting and exceeding industry standards for data protection, with a clear roadmap for expanding our compliance certifications as we grow.
Data Isolation & Multi-Tenant Architecture
Secure Multi-Tenant Infrastructure
Secure Multi-Tenant Infrastructure
Vance operates on a sophisticated multi-tenant architecture where each organization exists in its own secure environment. Think of it as having your own private vault within a highly secure building – while the infrastructure is shared, your space is completely private and inaccessible to others.
Vance operates on a sophisticated multi-tenant architecture where each organization exists in its own secure environment. Think of it as having your own private vault within a highly secure building – while the infrastructure is shared, your space is completely private and inaccessible to others.
Complete Data Separation
Complete Data Separation
Each customer environment is uniquely isolated through advanced containerization and data partitioning. Your technical documentation, service histories, and organizational knowledge are stored in dedicated database instances with strict access controls. This architecture ensures that your sensitive data remains completely separate from other organizations, eliminating any risk of data bleeding between tenants.
Each customer environment is uniquely isolated through advanced containerization and data partitioning. Your technical documentation, service histories, and organizational knowledge are stored in dedicated database instances with strict access controls. This architecture ensures that your sensitive data remains completely separate from other organizations, eliminating any risk of data bleeding between tenants.
Tenant-Specific Security
Tenant-Specific Security
Every customer environment benefits from:
Unique encryption keys for data protection
Isolated database instances and storage
Separate authentication and access controls
Independent backup and recovery systems
Every customer environment benefits from:
Unique encryption keys for data protection
Isolated database instances and storage
Separate authentication and access controls
Independent backup and recovery systems
Data Processing Isolation
Data Processing Isolation
Even during AI-assisted operations, your data remains isolated. Each processing request is handled in a separate, secure context, ensuring that your technical knowledge and service information never intermingles with data from other organizations. This isolation extends across all platform features, from document storage to AI analysis.
Even during AI-assisted operations, your data remains isolated. Each processing request is handled in a separate, secure context, ensuring that your technical knowledge and service information never intermingles with data from other organizations. This isolation extends across all platform features, from document storage to AI analysis.