Security-First Architecture

Security-first by design

Your credentials are sensitive. We built Vespine to protect them — with encryption, isolation, and zero plaintext storage.

How we protect your data

AES-256 Encryption at Rest

Your utility passwords are never stored in plaintext. We use AES-256 encryption — the same standard used by banks and government agencies — to protect credentials at rest.

TLS 1.3 in Transit

Every connection to Vespine uses TLS 1.3, the latest and most secure transport protocol. Data moving between your browser, our servers, and utility portals is always encrypted.

Zero Plaintext Storage

The moment you enter a credential, it's encrypted before storage. We use a secure vault architecture that isolates credentials from application code. Decryption only occurs in memory.

Strict Access Controls

Access to production systems is strictly limited. All access requires multi-factor authentication and follows the principle of least privilege. No single employee can access your credentials.

Complete Audit Logging

Every action in Vespine is logged: credential access, bill downloads, data exports. You have full visibility into what our system does with your accounts through your dashboard.

Incident Response Ready

We maintain documented incident response procedures and would notify affected customers promptly in the event of any security issue. Regular security reviews keep us prepared.

How we handle your credentials

From submission to usage, your credentials are always protected

1

Submission

You enter credentials through our encrypted dashboard (HTTPS/TLS 1.3)

2

Encryption

Credentials are encrypted with AES-256 before storage

3

Storage

Encrypted credentials stored in isolated secure vault

4

Usage

Credentials decrypted only in memory during automation runs

5

Access

No human access to plaintext credentials — ever

What we never do

  • Store plaintext passwords
  • Share credentials with third parties
  • Access accounts for any purpose other than bill retrieval
  • Retain credentials after you disconnect an account

Infrastructure security

Where your data lives and how it's protected

Cloud Infrastructure
Hosted on secure cloud infrastructure (AWS/Vercel)
Data Residency
US-based servers
Redundancy
Multi-zone deployment with automatic failover
Backups
Encrypted backups with point-in-time recovery
Network Security
VPC isolation, WAF protection, DDoS mitigation
Monitoring
24/7 automated threat detection

Compliance status

AES-256 EncryptionImplemented
TLS 1.3Implemented
No Plaintext CredentialsImplemented
Audit LoggingImplemented
GDPRCompliant
CCPACompliant
SOC 2 Type IIAvailable for Enterprise

Need SOC 2 or additional compliance?

For enterprise customers with specific compliance requirements, we can pursue SOC 2 certification or complete your security assessment process.

Contact us to discuss

You're always in control

Disconnect anytime

Remove credentials instantly from your dashboard

View activity

See every bill download and data access

Manage access

Control which team members can view credentials

Export data

Download your data at any time

Delete account

Request complete data deletion

Audit trail

Complete history of all actions

Security FAQs

Who can see my utility passwords?

No one. Not even Vespine employees. Credentials are encrypted with keys that are not accessible to our team. Decryption only happens programmatically during automation runs.

What's your uptime and reliability?

Vespine maintains 99.5%+ platform uptime. For bill fetching, our success rate averages 98%+ across all providers. Failed fetches (usually due to utility portal outages) automatically retry. You can monitor job status in real-time from your dashboard.

Are you SOC 2 certified?

We implement SOC 2-aligned security controls (encryption, access controls, audit logging) but have not yet completed formal certification. For enterprise customers who require SOC 2, we can pursue certification as part of your engagement. Contact us to discuss your compliance needs.

What happens if Vespine is breached?

In the unlikely event of a breach, encrypted credentials would be useless to attackers without the encryption keys, which are stored separately with additional protection. We maintain incident response procedures and would notify affected customers promptly.

How do you handle security incidents?

We maintain documented incident response procedures and conduct regular security reviews. We would notify affected customers promptly in the event of any confirmed security issue.

Can I get a security questionnaire completed?

Yes. We're happy to complete your vendor security assessment, SIG, or CAIQ questionnaire. Contact us to get started.

Do you support MFA on utility accounts?

Yes. Our AI agents handle common 2FA methods (SMS codes, email codes, authenticator apps) automatically. For accounts with MFA, we securely manage the verification process.

What happens if a utility portal changes?

Our AI agents adapt to portal changes automatically — that's a key advantage over traditional scraping. When utilities update their websites, our agents figure out the new flow without manual intervention. In rare edge cases, we resolve within 24 hours.

Security questions? Let's talk.

Our team is happy to walk through our security architecture or complete your vendor assessment.

Book a Security Review