# Security

Vectice understands the importance of protecting your data and applications, and we've implemented comprehensive security measures to ensure your safety. This page provides an overview of our robust security practices:

#### Pillars of Security:

* [**Data Storage Security**](/it-and-security/security/data-storage-security.md)**:** Your data is encrypted at rest and in transit, utilizing industry-standard methods to safeguard sensitive information.
* [**Network Security**](/it-and-security/security/network-security.md)**:** Our infrastructure is protected by firewalls, intrusion detection systems, and other advanced security controls to deter unauthorized access.
* [**Sessions**](/it-and-security/security/sessions.md)**:** We employ secure session management practices to prevent unauthorized session hijacking and maintain user accountability.
* [**Secrets and Certificates**](/it-and-security/security/secrets-and-certificates.md)**:** Sensitive data like passwords and API keys are securely stored and managed with robust encryption techniques.
* [**Audit Logs**](/it-and-security/security/audit-logs.md)**:** Detailed logs track user activity and system events, enabling us to identify and address potential security issues proactively.
* [**SOC 2 Compliance**](/it-and-security/security/soc2.md)**:** Our commitment to data security is further emphasized by achieving SOC 2 compliance, an independent audit verifying our adherence to the highest security standards.
* [**Security Updates**](/it-and-security/security/security-updates.md)**:** We prioritize timely application and system updates to address vulnerabilities and maintain optimal security posture.
* [**Best Practices**](/it-and-security/security/best-practices.md)**:** Our development and operations teams follow industry-leading security best practices to minimize risks and ensure a secure environment.
* [**Business Continuity**](/it-and-security/security/business-continuity.md)**:** We have implemented a robust business continuity plan that ensures data availability and service continuity in the event of a disruption.

This is just a high-level overview of our security measures. We are constantly evaluating and improving our security posture to adapt to emerging threats and maintain the highest level of protection for your data.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.vectice.com/it-and-security/security.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
