Trust Center

Security, trust, access control, logging, infrastructure, and incident response commitments for VexylCloud.

Security and trust

Security expectations should be visible before procurement starts asking.

VexylCloud is built to reduce operational sprawl, and that includes security sprawl. The goal is a smaller, clearer operating surface with attributable actions, strong access boundaries, practical controls, and explicit operational safeguards that fit MSP workflows.

Controls first Access boundaries, logging, and operational safeguards are part of the platform design.
Buyer-ready Trust material is public so technical review does not start with document chasing.
Operator-aware Security expectations are tied back to how MSP teams actually work day to day.

Architecture summary

The public website, trust material, and buying flow now sit on a cleaner single-server path.

  • Public site and theme updates are controlled through one WordPress environment
  • Protected staging is used before production theme changes are pushed live
  • Operational website changes are simpler to review because the serving path is less fragmented

Security contact

Give security, legal, and procurement reviewers a direct next step.

  • Email [email protected] for security and trust review routing today
  • Use the DPA, subprocessors, privacy, terms, and status pages for public review material first
  • Book a walkthrough when the trust question needs to be mapped against rollout and operating context

Incident-response summary

Security review should include how issues are handled, not just what controls exist.

  • Operational issues are triaged against impact and scope before broader communication starts
  • Status and support paths exist publicly so customers are not forced to chase the right contact during an event
  • Material issues can be mapped back to the same operating and customer context the platform already uses

Review pack

Give procurement and security reviewers the core public material in one pass.

Data handling

Review what the public trust surface says about handling customer data.

  • Public legal and privacy documents are linked directly so review does not depend on sales follow-up
  • Customer data handling, deletion, and contractual boundaries are anchored through the Privacy Policy, Terms, DPA, and Subprocessors pages
  • Trust review is meant to start from public material first, then move into direct questions only where needed

Uptime and support

Operational expectations should be obvious before procurement asks for them.

  • Status is the public destination for maintenance and operational visibility
  • Contact and [email protected] handle support, trust, and review routing
  • Book a walkthrough when the review needs to be mapped to rollout, support posture, and operating context together
Enterprise review path

The Trust Center is meant to reduce security and procurement drag before a deal stalls. Start with this page, then review DPA, Subprocessors, Privacy Policy, Terms & Conditions, and Status. If the remaining questions are environment-specific, route them through Contact or Book Demo.

Control areas

Access Role-aware access and tenant scoping Sensitive actions are designed to stay attributable and reviewable.

RBAC, tenant scoping, and approval boundaries are part of the broader product design so risky actions are not anonymous or detached from operator identity.

Transport Encryption and secure transport Website traffic is served over HTTPS/TLS, with provider-backed encryption and secure transport protections where appropriate.

The platform relies on established provider security controls while keeping the public website and supporting stack on a cleaner, better-defined path.

Signal Logging, monitoring, and diagnostics Incidents are easier to investigate when telemetry and diagnostics are already part of the stack.

Application monitoring, diagnostics, alerting, and operational telemetry are part of the current operating model so incidents can be investigated and traced quickly.

Change Protected staging and safer website iteration The public website now runs with a cleaner single-server path and a password-protected staging workflow.

Production updates can be reviewed without exposing unfinished work publicly, which reduces change risk for the website layer.

Response Incident handling and communications Material incidents are investigated, contained, and communicated according to severity and obligation.

Status, support posture, and related trust material are published so expectations are visible during evaluation.

Endpoint Security integrations inside operator context Supported AV / EDR integrations keep threat posture and response work close to devices, docs, and customer workflows.

Supported workflows include vendor connection and testing, deployment, policy, exclusions, scans, quarantine handling, and device isolation.

Review Antivirus & EDR coverage

Trust resources

Want the trust material mapped to your review process?

Book a walkthrough if you want security expectations, trust resources, and operating safeguards tied back to your MSP evaluation flow.

Review pack path Security and legal routing Operational safeguards in context