Skip to content

Rise Vision Information Security

We understand the importance of maintaining the security of our customers' data. Our commitment to transparency and protection is demonstrated through our independent SOC 2 Type II attestation, which verifies that we have implemented robust controls and procedures to safeguard customer information.

  • To support your security and compliance reviews, you can access documentation for our SOC 2 report, VPAT, Cyber Insurance, and HECVAT assessments through our Security Portal.

AICPA SOC TX-RAMP

If you believe you’ve discovered a security issue please let us know by emailing security@risevision.com.

Security Initiatives

Infrastructure

We leverage Google Cloud Platform (GCP), a secure and reliable cloud infrastructure provider. GCP provides us with a range of security features and controls that allow us to secure our systems and data at every layer of the technology stack.

infrastructure icon

Personnel Security

Policies and procedures, including background checks and security awareness training have been implemented to protect our customers’ data.

personnel-security-icon

User Access

We adhere to role-based access controls (RBAC) and the principles of least privileged access for all systems. User access reviews are performed frequently and revoke access when no longer needed.

user-access-icon

Software Development

Software development at Rise Vision adheres to strict requirements that follow industry best practices, including but not limited to:

  • Design review to ensure security requirements are incorporated. 
  • Static and automated testing for all code changes.
  • Required peer review before changes can be deployed to production.
  • Ongoing secure code training based on the OWASP Top 10.
software-development-icon

Monitoring and Logging

We monitor our systems and applications for suspicious activity and maintain logs to help us identify and respond to security incidents.

monitoring-and-logging-icon

Data Encryption

All data is encrypted at rest and protected by Transport Layer Security (TLS) when in transit.

data-encryption-icon

Penetration Testing

Penetration tests are performed at least annually by a qualified 3rd party.

penetration-testing-icon

Risk Management

We have implemented a risk management program to identify, assess, and mitigate potential risks to our business, our customers, and their data.

risk-management-icon

Disaster Recovery

We have plans in place to ensure that our services can be restored promptly in the event of a disaster or other disruptive event.

disaster-recovery-icon