Overview

VGS Proxies work with any endpoint. In order to keep this data safe, VGS employs several components in its own vault. This includes segregated accounts, key rotation, patch management, extensive audit logging, regular vulnerability testing, 24/7 monitoring, and AES 256 encryption. In addition, this vault has no direct access to the internet.

Last updated