Always safe, secure and in the Cloud

Thousands of users trust Vincere every second, everyday to keep their data safe and carry out business-critical operations that help turn profits. That’s why we’ve taken a no-nonsense philosophy when it comes to security, reliability and privacy of our Cloud-native applications.

“As a trusted software provider, nothing is more important to our company than protecting the data assets of our customers.”

Bernie Schiemer, CEO & Founder of Vincere

Today, Vincere counts some of the industry’s biggest names as happy customers- including Randstad, Intelligence, plus hundreds of smaller, growing recruitment firms across the globe.


We use Amazon Web Services (AWS) which manages a comprehensive control environment that includes the necessary policies, processes and control activities for the delivery of each of the web service offerings in a secure manner, so you can be assured that all your data is safe in the Cloud.

AWS is compliant of Industry Standard Accreditations:

  • SAS70 Type II – Detailed Service Auditor Report
  • PCI DSS Level 1 – PCI Data Security Standard
  • ISO 27001 – Certification for Security Management System
  • FISMA – Government Agency’s standard for Federal Information Security Management Act.

Physical Security & Access of AWS data centers:

We utilize innovative architectural and engineering approaches, covering Fire Detection and Suppression, Power, Climate and Temperature, and Management

Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.


Our deployments are hosted in 4 locations. We use top tier AWS data centers, strategically located close to you to ensure the highest performance…



Protection of data from unauthorized parties both from within the organisation and externally:


  • Data Read/View is configured within the Vincere software depending on user permission settings.
  • Only Super Users will be able to export data out of the system.
  • Some of our clients uses USB Lock to ensure that no data can be exported out from the computer.
  • Internet access to any social media disc drive (Box, Dropbox, MediaShare etc) can be made IP restricted.


  • To protect against data downloads externally, IP restrictions can be provisioned within the internal firewall.


We take significant protection against traditional network security issues to deter any attacks against your data including:

  • Distributed Denial of Service (DDoS) Attacks
  • IP Spoofing
  • Packet Sniffing
  • Port Scanning


In order to protect and maintain the accuracy of your data against malicious threats and attacks, we adhere strictly to the Data Leak Prevention (DLP) procedure.

  • Encrypted over HTTPS (SHA2 encryption) – a protocol that provides secure communications through the internet. Rest assured that your activities are as secure as internet banking.
  • Data at rest + Data at transit protection via encryption and cleansing.
  • Systematically, we create logs on all output channels for periodical checks.


GDPR Compliance

We are committed to address EU data protection requirements applicable to us as a data processor.

Microsoft’s Partner Network

Part of Microsoft’s Partner Network, we get your business up and running quickly and stay that way.


World class SSL certificate and encryption to secure online transactions and assure code integrity.


We have strict backup procedures and have put in place recovery plans to ensure quick restoration with minimal loss of data. When it comes to disaster recovery and your data, our mission is to keep the Vincere Cloud & services running at all times with the least disruption – and that’s our promise to you.




Store important backup data to local server

Every Weekend


Centralize backup data for all instances after all slave backups completed (backup of backup)

Daily from Monday to Friday


Cross-instance backup to maintain important service availability (file server)

Daily from Monday to Friday


Store backup data on each Server instance

Daily from Monday to Friday

backtypes MONTH

schedule UPTIME

Nov 2018


Oct 2018


Sep 2018



We strive to provide excellent uptimes for all our customers, no matter big or small.

Here is a report card of the monthly average of all hosted customer instance uptimes in the past quarter.