Trust Center

Security and trust,
built in from day one.

We hold our own security to the same standard we hold for every client we protect. This page documents our certifications, practices, policies, and commitments — in plain language, with no fine print.

Compliance & Certifications

Independently verified.
Continuously maintained.

Our certifications are not marketing badges — they are independently audited attestations of the controls we operate every day. We pursue certifications that matter to the clients we serve and the industries we protect.

SOC 2 Type II
Security, Availability & Confidentiality trust service criteria
Active
ISO 27001
Information Security Management System certification
Active
NIST CSF
NIST Cybersecurity Framework aligned operations & delivery
Aligned
GDPR
EU General Data Protection Regulation compliant data handling
Compliant

We eat our own
cooking.

VANGUR AI operates under the same security standards we deliver to our clients. Our internal infrastructure, tooling, and processes are subject to continuous monitoring, access controls, and regular third-party assessments — because we believe a security company that can't secure itself has no business securing others.

Zero Trust Architecture

Every access request — internal or external — is authenticated, authorized, and continuously validated. No implicit trust. No standing privilege.

Encryption Everywhere

All data at rest is encrypted with AES-256. All data in transit uses TLS 1.2+ with certificate pinning enforced on client-facing services.

Continuous Vulnerability Management

Our own infrastructure is scanned daily. We conduct quarterly internal pentests and an annual third-party red team engagement — no exceptions.

Least Privilege Access

Every employee and system account is granted the minimum access required to perform its function. Access is reviewed quarterly and revoked immediately upon role change.

Endpoint & Device Security

All employee devices are enrolled in MDM, run EDR agents with real-time protection, require full-disk encryption, and enforce phishing-resistant MFA for all applications.

Security Awareness Training

All staff complete role-specific security training quarterly. Simulated phishing campaigns run monthly. Security culture is built into onboarding — day one, not day ninety.

Data Privacy

Your data belongs
to you. Always.

We handle client data with the same discipline we apply to our own. Our data governance framework defines exactly what data we collect, why we collect it, how it is stored, who can access it, and when it is deleted — with no ambiguity and no exceptions.

Data Collection

Minimum necessary.
Nothing more.

We collect only the data required to deliver our services. No behavioral tracking, no advertising profiles, no secondary use of client telemetry. Data collected for security monitoring stays in the security monitoring context — period.

  • No sale or sharing of client data with third parties
  • No use of client data for product training without explicit consent
  • Telemetry and log data retained only for agreed service periods
  • Data deletion confirmed in writing upon contract termination
Data Residency

Your jurisdiction.
Your rules.

We support data residency requirements for clients in regulated industries and jurisdictions. Client data can be scoped to specific regional infrastructure, and we provide written documentation of data flows upon request for compliance and audit purposes.

  • Regional data processing available for LATAM, US, and EU clients
  • Data flow documentation provided for audit and compliance teams
  • Sub-processor agreements available for all third-party tools
  • GDPR Data Processing Agreements (DPA) available on request

We report what happens.
Good or bad.

Trust is built through transparency, especially in moments of adversity. Our disclosure and incident response commitments ensure that our clients and the broader security community are never left in the dark.

Incident Response Commitment
If a security incident affects VANGUR AI systems or client data, we will notify impacted parties within 72 hours of confirmed discovery — in accordance with applicable regulations and our contractual obligations. We provide written post-incident reports with root cause, timeline, and remediation steps.
Report an Incident
Responsible Disclosure Program
We welcome security researchers who identify vulnerabilities in our systems or services. Reports submitted in good faith will be acknowledged within 48 hours, triaged within 5 business days, and resolved with full credit to the researcher. We commit to no legal action against researchers who follow responsible disclosure guidelines.
Submit a Vulnerability
Legal & Policies

Our commitments,
in writing.

All VANGUR AI policies are reviewed and updated annually — or sooner when material changes occur. Clients are notified of substantive policy changes with a minimum of 30 days notice.

Privacy Policy
How we collect, use, store, and protect personal information across all VANGUR AI services.
Last updated Jan 2025
Terms of Service
The legal agreement governing your use of VANGUR AI's platform and managed services.
Last updated Jan 2025
Data Processing Agreement (DPA)
Our GDPR-compliant agreement for processing personal data on behalf of EU-based clients and partners.
Available on request
Acceptable Use Policy
Guidelines for the appropriate use of VANGUR AI tools, platforms, and managed service infrastructure.
Last updated Mar 2025
Sub-Processor List
A complete list of third-party vendors and sub-processors used to deliver VANGUR AI services, with data categories processed by each.
Available on request
Business Continuity & DR Policy
Our recovery time objectives (RTO), recovery point objectives (RPO), and tested continuity procedures for all critical service components.
Last updated Feb 2025

Questions about our
security practices?

Our security team is available to answer questions, share audit reports under NDA, or discuss specific compliance requirements for your organization.

security@vangur.ai