Last updated: 8 August 2025
We at Vistaly believe that security is a critical part of our platform. On this page, we include some best practices for how you can most securely use Vistaly. We also outline what we're doing to keep your data safe. Feel free to reach out with any questions to support@vistaly.com.
When using Vistaly, there are things you can do within our platform to improve security:
Vistaly supports single sign-on (SSO) via Google and Microsoft. Additionally, it supports self-registration with two-factor authentication (2FA / MFA) via time-based one-time passwords (TOTP). Multi-factor authentication can be enforced by organizational administrators to ensure all team members maintain secure access. To enhance security, Vistaly requires passwords to include a combination of digits, lowercase and uppercase letters, as well as symbols. By utilizing these controls, it decreases the likelihood of a user's account being compromised.
API Security: All API access is authenticated via secure tokens with proper authorization controls. Role-based access control (RBAC) ensures users only access resources appropriate to their assigned roles within the organization.
All of Vistaly's services are in the cloud. This allows the Vistaly team to iterate quickly on features while ensuring enterprise-level security.
Infrastructure Protection: Our cloud infrastructure includes DDoS protection and Web Application Firewall (WAF) to defend against malicious attacks and unauthorized access attempts. We maintain strict separation between production and non-production environments to ensure data integrity and security. All data centers provide 24/7 physical security monitoring and access controls.
Vistaly is SOC 2 Type 2 compliant. SOC 2 Type 2 is an independent, third-party attestation that evaluates how well a service organization implements controls to safeguard customer data and ensure privacy. This compliance demonstrates that Vistaly's systems and processes meet rigorous standards for security, availability, and confidentiality over time—not just at a single point. Our SOC 2 Type 2 report provides assurance to our customers that we are committed to maintaining a high level of trust and operational excellence when handling your data. If you would like to request a copy of our SOC 2 Type 2 report, please contact support@vistaly.com.
All core services run on Amazon Web Services (AWS) within U.S. based regions. AWS is an industry leader in security best practices. They are SOC 1, 2, and 3 compliant. They additionally have ISO certifications for ISO/IEC 27001:2013, 27017:2015, 27018:2019, 27701:2019, 22301:2019, 9001:2015, and CSA STAR CCM v3.0.1. You can find additional information here.
Vistaly aims for 99.9% uptime or higher for its services. You can view Vistaly's current status along with system updates at status.vistaly.com.
Vistaly implements comprehensive data isolation to ensure complete separation between customer organizations:
Your team's data is never visible to other Vistaly customers. We implement defense-in-depth strategies with multiple security layers to ensure your organization's data remains completely private and isolated.
AI Processing: When AI features are used within Vistaly, all processing occurs in isolated environments with strict data boundaries. Your data is never used to train AI models or shared with other customers. For detailed information about our AI data usage policies, please see our Privacy Policy.
All Vistaly data is encrypted at rest using AES-256 encryption and in transit using TLS 1.2+ protocols. Data is backed up and encrypted following a daily, weekly, and monthly 7 year retention policy.
From within Vistaly, we version customer's data so that they can view historical data and revert to an earlier version if needed.
Vistaly does not handle any payment information. All payments are processed by Stripe, a PCI Service Provider Level I. You can read more information here.
All Vistaly employees must agree to management approved policies. These policies include, but are not limited to:
Employee Data Access: Vistaly employees do not have access to customer data by default. Any support-related access requires explicit customer permission and is logged for audit purposes. Access is granted temporarily and automatically revoked after the support request is resolved.
Vistaly uses Git (a version control system) to manage all code for the Vistaly platform. All code is reviewed by at least two engineers before it is merged into the main branch. Additionally, automated unit tests, and code quality checks must pass. In order to promote code to production, a suite of integration tests, and end to end tests must also pass.
Vistaly utilizes Dependabot to monitor vulnerabilities in project dependencies and keep them up to date. For more information visit here.
Vistaly maintains comprehensive security monitoring capabilities to detect and respond to potential threats:
Vistaly maintains a comprehensive incident response plan to address potential security events:
In addition to our SOC 2 Type 2 compliance, Vistaly maintains:
Customers can request our latest compliance certificates by contacting support@vistaly.com.
Vistaly maintains a comprehensive security governance framework to ensure consistent security practices and oversight:
For data protection inquiries, contact our DPO at dpo@vistaly.com.
Vistaly maintains rigorous vendor management practices to ensure third-party providers meet our security standards:
A complete list of our sub-processors and their compliance status is available at Sub-Processors.
While utilizing Vistaly, if you encounter a vulnerability, please send an email to security@vistaly.com with details of your finding. The Vistaly team will promptly respond to all reports.
A single workspace for connecting strategy, discovery, and delivery –– visually
©2025 Vistaly, Inc.
Product updates, exclusive live events, and more