For BlendVision products, we prioritize end-to-end security by implementing robust measures to safeguard your data and networks, while ensuring compliance with global standards. Our comprehensive security framework is built on three core pillars:
Data Security & Privacy
We employ advanced technologies and methodologies to ensure the highest levels of data security and privacy:
Tenant Isolation
Isolate customer data to prevent unauthorized access and ensure each customer’s data remains secure and separate.
AI Model Privacy
Prevent customer data from being shared or used for foundation model training, ensuring strict privacy controls for AI-related data.
Data Encryption
All data is protected with AES-256 encryption at rest and SSL/TLS protocols for data in transit, safeguarding your information from unauthorized access and interception.
DRM (Digital Rights Management)
Content is protected using industry-leading DRM technologies such as FairPlay, Widevine, and PlayReady encryption to prevent unauthorized distribution and access.
IAM & Permission
Ensure authorized access with granular Role-Based Access Control (RBAC) and Single Sign-On (SSO) for streamlined identity and permission management.
Network & Infrastructure Security
Our network and infrastructure security strategies are designed to protect against a wide array of threats:
Network Security
Isolate networks and protect them from DDoS attacks, Man-in-the-Middle (MITM) attacks, port scanning, and unauthorized access using Virtual Private Clouds (VPCs), Web Application Firewalls (WAF), Access Control Lists (ACLs), HTTPS/TLS, and firewalls.
Vulnerability Assessments
Identify and address potential vulnerabilities with regular static application security testing (SAST), ensuring continuous improvement of our security posture.
Compliance & Security Partners
We partner with leading organizations and comply with international standards to ensure our platforms meet the highest security requirements:
- CASA (Cloud Application Security Assessment)
- Microsoft Azure
- AWS