Close menu
Close menu Log in

We understand the incredible responsibility of keeping your information secure. We also know that the success of our service relies on it.
That’s we don’t let up on security for even a second.

Vyzer’s Security Measures

vyzer feature

Vyzer encrypts data at rest and in transit.

vyzer feature

Vyzer does not store your banking or crypto account credentials.

vyzer feature

Vyzer requires Two-Factor Authentication (2FA) login.

vyzer feature

Vyzer hires cybersecurity experts to identify and address vulnerabilities before adversaries do.

Our Privacy Commitment to You.

Vyzer will never trade, sell, or share your private information or data with a third party.


Here are answers to some of the most frequently asked questions we receive regarding our security policies and protocols. If you have more questions, just email us at

No. Vyzer does not directly host your banking or crypto account credentials.
Vyzer uses third party financial account aggregator services – including Plaid, Yodlee, Salt Edge & Zabo – to connect to your accounts and keep your credentials safe. When you enter your banking credentials on your account, your credentials are sent directly to the respective service, but never to Vyzer’s servers. These platforms then provide Vyzer with a “ready only” interface, so we cannot access your specific credential or make transactions on your behalf.

Read more here about how PlaidYodleeSalt Edge & Zabo adhere to industry leading practices for data security, regulatory compliance, and privacy.

Absolutely, we prioritize your data security. All information within Vyzer is encrypted both while it's at rest (stored) and during transit, making it highly secure from potential breaches or interception. Although your data is not end-to-end encrypted, your data is still secure. Our robust security measures are thoroughly designed to safeguard your data throughout all stages of its presence in our system. The absence of end-to-end encryption simply means that as your service provider, we have the ability to access raw data when necessary to provide certain services and functionalities.

At rest encryption ensures your data is secure when being stored. At Vyzer, all of our databases and files are stored in Amazon Web Services (AWS) servers, which have their content encrypted while it sits idle and when it’s backed up. This protects against unauthorized copying, transfer or retrieval of user data from our servers. Even if someone was able to get access to a backup of the database, they wouldn’t have the key to decrypt it, making the data useless to them and protecting our users.

In transit encryption protects your data as it’s traversing the internet. Communication between our servers and your browser are secured via HTTPS, and our HTPS policy ensures no other protocol is used, which guarantees that all communication takes place over a secure connection.

End-to-end encryption makes the data “unreadable” by the very service or the app you used to create it. The data is only readable by the specific user.

End-to-end encryption withholds all of your data from Vyzer, but not having any access to your data would prevent Vyzer from performing several of its fundamental benefits and features. For example, we need occasional access to your data for background syncing, ensuring your data is safe to transfer to your beneficiary. Even though we can't do end-to-end encryption, your data in Vyzer is indeed encrypted at rest and in transit.

Your banking credentials will remain safe since we do not store them. See the answer to "Does Vyzer have access to my online bank and crypto account?" for more information.

All your data in Vyzer is encrypted at rest on AWS servers. So, even if a hacker obtained a database backup, it'd be useless because they wouldn't have the key to decrypt it, protecting all of your data.

It's also unlikely that your data will be breached in transit. Vyzer's communication between our servers and your browser is secured with HTTPS, and our HSTS policy ensures browsers can only ever connect to our platform over a secure connection.

Simply put, we require 2FA because your data will be more secure.

Customer passwords and user IDs are notoriously vulnerable and easy to hack, especially when customers choose easy-to-guess or repeated passwords. Another vulnerability comes when people write down their passwords (in online or physical files), where thieves and cyberthieves can discover them.

2FA makes data more secure with one-time passwords (OTPs) and physical characteristics (like fingerprints and voice recognition), which are more difficult to breach and add another layer of security to your account.

To add another layer of safety, you should not store any information in Vyzer that would be highly risky if it fell into the wrong hands. For example, please don’t store any passwords, credit card numbers, or crypto wallet private keys in Vyzer.You should store only the information or documents needed to help you track your wealth, or for your legal heir to know and claim your property.

If your data sharing needs require end-to-end encryption, don’t use Vyzer. Instead, we recommend considering password managers like LastPass and 1Password, but be sure to research these platforms and understand their complexities before using them.

No, Vyzer NEVER sells your data.

We're primarily funded by subscription fees and support from our VC partners and angel investors.

In specific instances when data is shared with third parties (typically for analytics), we strictly ensure these parties do not sell your information. We're committed to protecting your data and ensuring your privacy.

When you delete your account, we delete all your data from our primary database immediately. We also notify our aggregators to stop connecting your account and to delete all of the data on their end.

We keep rotating backups for 30 days. So, your data will be removed from the backup in the next backup purge cycle.

Yes, we engage with external security firms to review our application security. We are committed to working with renowned security experts to audit our internal and external security practices on a regular basis.