Your data, safe with Vive

For years, data security has been an important topic in the news. Leaked password lists, DDoS attacks, and compromised organisations: the list seems endless. As a result, more and more people are attaching (even more) value to their digital security. Especially when it comes to finances. And rightly so, because you prefer to keep information about your financial situation to yourself.

Discover how Vive secures your data in this article. Among other things, you will read why your data is safe, how our data architecture works, and how we send and secure information.

Vive’s data security in brief

Vive does everything possible to secure your data as effectively as possible. Below, you can briefly read how we do that:

- Vive is an internet-based platform where security is fundamentally built in

- Vive uses a thin-client architecture: hardly any data is stored locally

- Vive is stateless: every exchange of information is re-authorised

- Vive uses a passwordless login to minimise the chance of cracking

- Vive runs entirely in Amazon's data centres: safe and up-to-date

- All incoming and outgoing communication and data storage is encrypted

Secure from the foundation

How can a company like Vive compete with large banks and institutions that spend millions on security? The answer is simple: Vive built its platform and app with modern (data) security as its most important starting point.

The systems of banks and other institutions were often built before the internet age. As a result, they are constantly playing catch-up. They have to secure old systems with new technology because these outdated systems are fundamentally insecure. That is why it is much more complex for these institutions to properly secure their (data) systems. We are not saying that banks and large institutions are unsafe, by the way. The point we are making is that Vive is set up from the foundation for modern data security.

Secured from the core

For the Vive app, we chose a thin-client architecture. All information, calculations, and processes are stored within the Vive platform. An advantage of this is that hardly any information is stored on your phone. The information that is stored is fully encrypted.

In addition, the architecture of the Vive app is stateless. This means that every request for information is authenticated again. With every exchange, it is checked whether the requester is also the owner of the information.

Login without a password

Vive uses passwordless login. We are convinced that this is safer than logging in with a username and password. When people choose for themselves, they often opt for an easy-to-remember password. And an easy-to-remember password is easy to crack. But even if you choose a difficult password, it is only truly secure if you change it regularly. And that rarely happens in practice.

With a passwordless login, you receive a one-time password in your inbox with every login. This password is only valid for five minutes. This means you have access to Vive if you have access to your email. Without the risk of your password being cracked.

Everything in the cloud

The Vive platform runs entirely in Amazon's data centres. This automatically gives us access to the most up-to-date technology and best practices. A recent penetration test has confirmed this once again. During this test, a cybersecurity company attempted to break in and discover weaknesses. That was unsuccessful, and not a single weak point was found. Because Amazon continuously keeps its technologies up-to-date, we remain provided with the best security. In addition, we also have our data security assessed annually by an independent data security agency. This way, we ensure we have no blind spots.

For all customer data, we only use  EU data centres. This means all customer information falls under EU legislation and is therefore outside the reach of governments that are not in the European Union.  

Always encrypted

All communication between the platform and the outside world takes place in an encrypted manner. As a result, any interceptions yield completely unusable information. Your customer data is also stored in an encrypted format. Any physical access, which is highly unlikely, also leads to unusable files.