Reviewing Our Technical & Infrastructure Security
Review our vlex cloud security. This guide covers our legal tech infrastructure, including our disaster recovery plan and multi-layered network security measures.
Summary
Review our vlex cloud security. This guide provides a transparent overview of our legal tech infrastructure, including our cloud architecture, our disaster recovery plan, and the multi-layered network security measures we have in place to protect the platform.
Why This is Important
A secure application requires a secure foundation. This article explains the technical and infrastructural measures we take to ensure the vLex platform is resilient, reliable, and protected against modern cyber threats. This gives you the confidence that our service is built on an enterprise-grade, secure infrastructure.
Our Infrastructure Security Framework
Our infrastructure security is built on three key pillars: a world-class cloud architecture, a robust business continuity plan, and a multi-layered network defense.
1. Cloud Architecture
We build our platform on industry-leading cloud infrastructure to ensure scalability, reliability, and security.
Hosting Provider: Our platform is hosted on Amazon Web Services (AWS), a leading cloud provider that is certified with the highest industry standards, including SOC 2 Type II and ISO 27001.
Shared Responsibility Model: We adhere to the AWS Shared Responsibility Model. This means:
AWS is responsible for the security of the cloud (protecting the physical data centers and core infrastructure).
vLex is responsible for security in the cloud (protecting our application, your data, and managing access controls).
2. Business Continuity & Disaster Recovery (BCDR)
We maintain a comprehensive BCDR plan to ensure service availability and protect your data in the event of a major disruption.
Documented and Tested Plan: We have a formal, management-approved BCDR plan that is tested at least annually to verify our ability to recover.
Defined Objectives: Our plan includes specific Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) to minimize downtime and potential data loss.
Geographic Diversity: Our infrastructure includes failover locations in geographically diverse regions to protect against regional outages.
3. Network Security
We employ a multi-layered defense strategy to protect our network from unauthorized access and malicious activity.
Firewalls and Network Segmentation: We use firewalls, Virtual Private Clouds (VPCs), and AWS Security Groups to isolate our network environments and strictly control all inbound and outbound traffic.
Continuous Vulnerability Scanning: We use automated tools to continuously scan our applications and infrastructure for vulnerabilities, allowing us to identify and patch potential weaknesses proactively.
Third-Party Penetration Testing: We engage independent, certified security firms to conduct penetration tests on our platform at least annually. This simulates real-world attacks to validate the strength of our defenses.
Best Practices & Pro Tips
Use the information in this article and our Trust Center to streamline your firm's vendor security review process.
Related Articles
What's Your Next Step?
Last updated
Was this helpful?

