Security Policy

CloudVane relies on Oracle Cloud Infrastructure, Next-Generation Enterprise Cloud to keep users company data safe and secure every day. Oracle Cloud Infrastructure provides high-performance, secure and highly available services that scale elastically.
Oracle Cloud Infrastructure’s security approach is based on seven core pillars. Each pillar has multiple solutions designed to maximize the security and compliance of the platform.

• Customer isolation
• Data encryption
• Security controls
• Visibility
• Secure hybrid cloud
• High availability
• Verifiably secure infrastructure


CloudVane runs on Oracle Cloud Infrastructure. All CloudVane machines limit access to the least number of people necessary to keep them up and running. Deploys are automated to all machines using Kubernetes, and all machines with access to CloudVane data have a high security access in place to prevent unauthorized access to customer data.


All data exchanged with CloudVane is done via the HTTPS protocol.


CloudVane data is stored on OCI in Oracle Autonomous Database. World’s first autonomous database eliminates complexity, human error, and manual management, helping to ensure higher reliability, security. All data is automatically secured with strong encryption, turned on by default. Access is monitored and controlled, protecting from external attacks and unauthorized internal access.


No CloudVane employee will ever see your customer data unless required to do so for support reasons. If you reach out with a support issue which requires us to access your customer data, we will request and wait for your written permission before doing so. We have an audit trail of customer data access to prevent misuse. We would only access your customer data without your permission in the event of a rare, emergency service incident that is causing system-level outage.


All passwords are filtered from all our logs and are encrypted in the database. Login information is always sent over SSL.


To ensure another layer of security, additionally to classical database security data separation on database level is implemented.


If you have any questions or concerns, please contact us at

We use cookies to give you the best online experience. By agreeing you accept the use of cookies in accordance with our cookie policy.

Privacy Settings saved!
Privacy Settings

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. Control your personal Cookie Services here.

These cookies are necessary for the website to function and cannot be switched off in our systems.

In order to use this website we use the following technically required cookies
  • wordpress_test_cookie
  • wordpress_logged_in_
  • wordpress_sec

Decline all Services
Accept all Services