At Warp VR, we are committed to ensuring the security, reliability, privacy, and compliance of our services through rigorous security checks, safe data storage, employee screenings and more. These help you to work safely, securely, and confidently with VR training.

Compliance

Information security and data privacy are foundational principles of everything we do, and we adhere to regulations to advance information security and data privacy like the GDPR. For more information please visit the following page:

Data security, Infrastructure, GDPR and SLA

ISO27001

Warp VR, and all of its holdings, is ISO/IEC 27001 certified. The ISO/IEC 27001 standard requires organizations to establish an information security management system and apply a risk management process. Our certification can be found here:

Warp VR - ISOIEC-27001.pdf

Controlled access

Control who can manage, view, and edit projects with granular permissions. Access to scenarios and features is restricted using industry standards to integrate and automate with your existing systems, such as SCORM, LTI, REST, SAML, OIDC and SCIM. Audit logs are available to evaluate activity in your organization.

Support

Get started quickly with our extensive onboarding program, instructional video library, help center and 24/7 support chat. Follow our train-the-trainer workshops or get customized support from experts in scenario writing, filming and implementation to further improve adoption, engagement & impact.

Engineering

We follow best practices for secure coding, peer review, deployments and access to production data. Processes are automated as much as possible to avoid introducing human errors.

Hosting

We partner with industry-leading hosting providers to create redundant and reliable hosting infrastructure, and follow best practices to ensure high availability on all our services. All Warp VR services are hosted on Amazon Web Services (AWS) in the eu-central-1 (Frankfurt) region.

We make frequent automated backups of customer data and have implemented advanced recovery options where feasible. We store backups in a redundant way and test our recovery frequently to reduce the likelihood of data loss and minimize downtime in case of large scale incidents. We have built redundancy into all our services to eliminate single points of failure in our infrastructure.

Encryption

Your data is always encrypted in-transit and at-rest using industry standard encryption protocols and ciphers. Encryption keys are securely managed by the Amazon Key Management Service.