Vocus provides state-of-the-art data security and privacy to our clients, ensuring that your data is safe around the clock. Vocus devotes significant resources to continuously develop our world-class infrastructure. We know that security is paramount to our clients – and we’ve made it our highest priority.

When you subscribe to Vocus, you will enjoy unsurpassed protection and peace-of-mind.

Security Measures

  • Continuous deployment of proven, up-to-date security technologies
  • Ongoing evaluation of emerging security developments and threats
  • Complete security redundancy throughout the entire architecture
  • Full commitment to a secure, scalable, hosted system
  • Complete third party security audit for all systems

World-Class Security

We deliver a security infrastructure comprised of current, proven, cutting-edge technologies. Vocus delivers the most comprehensive security available – firewalls and encryption devices sourced from leading Internet security vendors, configured by expert professionals, and rigorously tested before going into production.

  • Physical Security
    Our production data centers provide 24-hour physical security, palm print and picture identification, redundant electrical generators, redundant data center air conditioners and other back-up equipment designed to keep servers continually up and running.
  • Perimeter Defense
    Perimeters of production and corporate networks are protected by firewalls developed by leading security vendors.
  • Data Encryption (provided upon request)
    Vocus offers 128-bit SSL for secure HTTP connections between client computers and our servers.The lock icon in the browser indicates that data is fully shielded from access while in transit.
  • User Authentication
    Users access Vocus only with a valid username and password combination, which is optionally encrypted via SSL while in transmission.
  • Application Security
    Our robust application security model prevents one Vocus customer from accessing another’s data.This security model is reapplied with every request and enforced for the entire duration of a user session.
  • Internal Systems Security
    Inside of the perimeter firewalls, systems are safeguarded by network address translation, port redirection, IP masquerading, non-routable IP addressing schemes, and more. Exact details of these features are proprietary.
  • Operating System Security
    Vocus enforces tight operating system-level security by using a minimal number of access points to all production servers.We protect all hosts with strong passwords.All hosts are maintained at each vendor’s recommended patch levels for security.All hosts are hardened by disabling and/or removing any unnecessary users, protocols and processes.
  • Database Security
    Whenever possible, database access is controlled at the operating system and database connection level for additional security.Access to production databases is limited to a number of points.
  • Server Management Security
    All data entered into the Vocus application by a customer is owned by that customer.Vocus employees do not have direct access to the Vocus production equipment, except where necessary for system management, maintenance, monitoring, and back-ups.Vocus does not utilize any managed service providers. The Vocus site operations team provides all system management, maintenance, monitoring and back-ups.
  • Reliability and Backup
    All networking components, load balancers, Web servers, and application servers are configured in a redundant configuration.All customer data is automatically backed up to tape on a nightly basis. Back-up tapes are moved to secure, fire-resistant off-site storage on a regular basis. Disaster recovery plans are in place.

Note: Use of the Vocus services are subject to the terms of use in the customer license agreement. Vocus may change its security infrastructure and/or this security data sheet from time to time.