Close menu
Close menu Log in

We understand the incredible responsibility of keeping your information secure. We also know that the success of our service relies on it.
That’s we don’t let up on security for even a second.

Vyzer’s Security Measures

vyzer feature

Vyzer encrypts data at rest and in transit.

vyzer feature

Vyzer does not store your banking or crypto account credentials.

vyzer feature

Vyzer requires Two-Factor Authentication (2FA) login.

vyzer feature

Vyzer hires cybersecurity experts to identify and address vulnerabilities before adversaries do.

Our Privacy Commitment to You.

Vyzer will never trade, sell, or share your private information or data with a third party.

FAQs

Here are answers to some of the most frequently asked questions we receive regarding our security policies and protocols. If you have more questions, just email us at hello@vyzer.co

No, Vyzer never directly accesses your banking or crypto account credentials. Instead, we utilize third-party financial account aggregator services, such as Plaid & Salt Edge, to securely connect to your accounts. When you input your banking credentials, they are sent directly to these providers, not to Vyzer's servers. These providers then grant Vyzer a "read-only" access, ensuring we can't access your specific credentials or conduct transactions on your behalf.

Learn more about how PlaidSalt Edge uphold industry-leading standards for data security, regulatory compliance, and privacy.

Absolutely. At Vyzer, your data security is paramount. All information is encrypted both in transit and at rest, ensuring robust protection against potential breaches or interceptions. While we don't use end-to-end encryption, rest assured that our comprehensive security measures are meticulously designed to safeguard your data at every stage. The absence of end-to-end encryption allows us, as your service provider, to access raw data when needed to deliver specific services and functionalities.

At Rest Encryption This refers to the protection of your data when it's stored. At Vyzer, all our databases and files reside on Amazon Web Services (AWS) servers. The content is encrypted both while it's idle and during backups. This encryption ensures that even if someone were to access a database backup, they wouldn't possess the decryption key, rendering the data useless and maintaining user security.

In Transit Encryption This pertains to the protection of your data as it travels across the internet. All communications between our servers and your browser are secured via HTTPS. Our strict HTTPS policy ensures that no other protocol is used, guaranteeing all interactions occur over a secure connection.

End-to-end encryption is a security measure that ensures data remains "unreadable" throughout its entire journey from sender to receiver. When data is encrypted using this method, even the service or app facilitating the transmission cannot decipher its contents. Only the specific sender and intended receiver possess the unique keys to decode and access the information, ensuring maximum privacy and security.

While end-to-end encryption would make all of your data inaccessible to Vyzer, such a level of encryption would hinder many of the platform's core functionalities. For instance, we require periodic access to your data for tasks like background syncing and ensuring safe data transfer. Although we don't employ end-to-end encryption, rest assured that your data within Vyzer is securely encrypted both at rest and in transit.

Even in the unlikely event of a breach, your banking credentials remain secure as we don't store them. For more details, refer to the answer for "Does Vyzer have access to my online bank and crypto account?"

All data within Vyzer is encrypted at rest on AWS servers. This means that even if an unauthorized individual were to access a database backup, they wouldn't be able to decrypt or use the data without the necessary decryption key.

Furthermore, the risk of data being intercepted in transit is minimal. Communication between Vyzer's servers and your browser is secured using HTTPS. Our HSTS policy also ensures that browsers connect to our platform exclusively over a secure connection.

At Vyzer, we prioritize your security.

While user IDs and passwords are essential, they can be vulnerable, especially if users opt for easily guessable or reused passwords. There's also the risk of passwords being noted down or stored unsafely, making them accessible to potential threats.

2FA addresses these vulnerabilities by adding an extra layer of protection. It combines something you know (your password) with something you have (a one-time password or OTP) or something you are (biometric data like fingerprints). This multi-layered approach significantly enhances the security of your Vyzer account, making it much harder for unauthorized access.

While Vyzer is designed with security in mind, there are additional precautions you can take:

  1. Limit Sensitive Information: Avoid storing highly sensitive data in Vyzer, such as passwords, credit card numbers, or crypto wallet private keys.
  2. Consider End-to-End Encryption for Sharing: If you need to share data that requires end-to-end encryption, Vyzer might not be the best fit. Instead, look into password managers like LastPass or 1Password. However, ensure you research and understand the intricacies of these platforms before adopting them.

By following these guidelines, you can maximize the safety of your data while benefiting from Vyzer's features.

Absolutely not. At Vyzer, your data's privacy is our top priority.

Our primary sources of funding are subscription fees, along with support from our VC partners and angel investors. On the rare occasions when data is shared with third parties, typically for analytics purposes, we take precautionary measures to ensure these entities do not sell or misuse your information.

Your trust is vital to us, and we're unwavering in our commitment to safeguarding your data.

When you choose to delete your account, we take immediate action. All your data is removed from our primary database without delay. Additionally, we instruct our aggregators to cease any connections to your account and to erase all associated data they hold.

For security and operational reasons, we maintain rotating backups for a period of 30 days. This means that your data will persist in these backups but will be permanently deleted in the subsequent backup cleanup cycle.

Absolutely. We collaborate with reputable external security firms to rigorously assess our application's security. Our commitment extends to regularly partnering with leading security experts to ensure both our internal and external security measures are top-notch.