Security
Your revenue data is the lifeblood of your business.
We treat its security as our highest priority — built on AWS, audited by third parties, and documented in plain English.
SOC 2
Type II
Independently audited annually
ISO 27001
Information Security
Certification planned
GDPR
EU data protection
Processor obligations met
Privacy Act
Australia (APP 1-13)
Compliant for AU customers
AES-256
Encryption at rest
Bank-grade, per-tenant keys
TLS 1.3
Encryption in transit
Latest transport protocol
Certifications reflect current controls or documented roadmap. Reports available under NDA — contact us.
How we protect your data
Eight pillars of the Voyager security model.
Infrastructure
Built on AWS across multiple regions for high availability and data residency.
- Network segmentation between systems
- DDoS protection on all public endpoints
- 24/7 traffic and health monitoring
- Auto-scaling to absorb traffic spikes
Encryption
Two layers of encryption protect your data end-to-end.
- AES-256 encryption at rest
- TLS 1.3 encryption in transit
- Database-level encryption — admins can't read raw data
- Keys stored apart from data, rotated on schedule
Access controls
You decide who sees what. Fine-grained controls for your team and ours.
- Role-based access control (RBAC)
- Field-level restrictions for sensitive data
- MFA recommended for every user
- SSO/SAML on Enterprise plans
Application security
Security baked into every step of development.
- Regular third-party penetration tests
- Automated vulnerability scans on every commit
- Mandatory peer review before release
- Dependency patches within hours of advisories
Integration security
Connecting Voyager to other tools is safe and revocable.
- OAuth 2.0 everywhere — no stored passwords
- Scoped API tokens, revocable instantly
- Signed outbound webhooks (HMAC-SHA256)
- Full audit trail of connected integrations
Data isolation
Your data is separated from every other customer — both logically and cryptographically.
- Application blocks cross-tenant queries
- Separate encryption keys per tenant
- Even if attackers breached the DB, they couldn't decrypt another tenant's data
- Data residency options on Enterprise plans
Monitoring & response
Continuous monitoring with a defined incident playbook.
- Access patterns and login anomaly detection
- Data transfer volume tracking
- System errors triaged 24/7
- Affected customers notified within 72 hours
Business continuity
Your revenue data is too important to lose. We plan for every scenario.
- Automated backups every 6 hours, stored in multiple regions
- Point-in-time recovery to any recent moment
- 99.9% uptime SLA
- Tested disaster recovery plan
Responsible disclosure
Security researchers keep us honest.
Found a vulnerability? Email support@voyagermsp.com — we respond within one business day. We allow reasonable time to fix before public disclosure, won't pursue legal action against good-faith researchers, and offer recognition or compensation based on severity.
Have security or compliance questions?
Talk to our team.
We're happy to walk through our controls, share our SOC 2 report under NDA, and answer specific concerns for your security review.
Frequently asked questions
What encryption standards does Voyager use to protect customer data?
Voyager protects data at rest using AES-256 encryption, the same military-grade standard used by governments and financial institutions worldwide, and protects data in transit with TLS 1.3, the latest and most secure transport layer encryption protocol.
Is my data isolated from other customers' data on Voyager?
Yes, each customer's data is logically isolated at the application level with no cross-tenant data access possible, and separate encryption keys per tenant provide additional cryptographic isolation to ensure that even in the unlikely event of a database compromise, an attacker would only have access to one customer's data.
What compliance certifications does Voyager maintain?
Voyager maintains SOC 2 Type II compliance with independent third-party audits, along with GDPR readiness for European Union customers and Australian Privacy Act compliance for Australian customers.
How does Voyager handle security incidents?
Voyager's security operations center monitors the platform 24/7 for suspicious activity, and the company commits to notifying affected customers within 72 hours if their data has been compromised, along with detailed information about what happened and remediation steps taken.