top of page

Security

Security at Vincere 

Vincere Health provides robust tools and programs for our patients, clients and staff to help provide and receive world-class care for all. Vincere Health takes security and compliance seriously, and ensures that all of our services and offerings meet the most stringent security practice requirements.

001-secure.png

Data Security

Vincere Health encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.

002-credit-card.png

Application Security

Vincere Health regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment.

Vincere Health also uses high-quality static analysis tooling provided by GitHub and Amazon Web Services to secure our product at every step of the development process.

003-cloud.png

Infrastructure Security

Vincere Health uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector.

In addition, we deploy our application using containers run on AWS managed services, meaning we typically do not manage servers or EC2 instances in production.

Security Standards

Vincere Health follows industry-leading security standards to ensure clients, patients, and our staff are always secure.

Accountable HIPAA Badge.png
Soc2 Type II Badge.png
bottom of page