Viso Suite
Evaluation Guide

Security

Table of Contents

Secure and protect all data and applications with cutting-edge technology. Viso Suite deeply integrates enterprise-grade security capabilities for the entire computer vision lifecycle. Viso Zero Trust Security provides multiple layers of protection. Manage teams with a powerful user management, role-based access control (RBAC), and custom user roles. Implement user password policies, session management, and multi-factor authentication (MFA).

The built-in application lifecycle management capabilities of Viso Suite promote a clear assignment of responsibilities in the development and DevOps processes, laying the foundation for a secure software development lifecycle. Log and trace all activities and events.

Viso Suite dramatically accelerates the development of secure computer vision applications and their secure deployment to distributed systems of connected edge devices and endpoints.

Application Security

Applications built with Viso Suite benefit from an extra level of security through containerization and encryption on multiple levels. Viso Suite uses a multi-layered security approach to protect applications from common application vulnerabilities.

Viso Suite generates standard applications from its runtime, enabling standard security assessment tools, such as static code analysis, to vet the runtime code.

To systematically ensure high-security standards for generated applications, Viso Suite leverages security assessment tools as part of the automated quality assurance process for every release.

Modern static code analysis tools automatically perform code vulnerability scans. The modules used to build the application are tested against aggressive criteria to ensure the application code is inherently secure.

When new code vulnerabilities are discovered, fixes are included in subsequent releases of Viso Suite. After upgrading their current Viso Suite release, customer applications automatically incorporate the new security fixes, reducing the cost of maintaining Viso Suite applications.

Additionally, Viso Suite complies with and accelerates the implementation of common security requirements:

  • Application security checks
  • Access control
  • Multi-Factor authentication
  • Encryption
  • Auditing
Application Security Checks

All built-in modules by viso.ai that can be used to build applications are tested against security risks. Detected risks include OWASP Top 10.

Access Control

Viso Suite provides role-based access control to restrict access to applications depending on specific roles, using a granular permission system. For example, a role might restrict access to updating or removing applications.

Viso Suite makes it easy for workspace admins to visually set user role access rights for the individual workspace tools and areas. The role-based access control ensures that only authorized users are allowed to perform specific business functions.

Encryption

Viso Suite provides built-in HTTPS/SSL encryption for all distributed computer vision applications – system-wide. Viso Suite allows full database encryption at rest of all systems in the cloud and at the edge.

Auditing

Viso Suite logs all access to the systems and records the actions performed by workspace users. Viso Suite logs all web service requests to applications running inside the Viso Platform. The logs keep a record of who made the request, the request’s target, the method called, and the exact time of the request. This enables any security issues to be tracked down efficiently.

Secure Application Deployment

The Viso Suite deployment engine allows the building of demanding, distributed edge computer vision systems with built-in security features.

The security model that supports the entire application lifecycle is tailored to support both simple and complex computer vision applications. Workspace administrators can set restrictions on who is allowed to perform specific actions to the appropriate environment.

Zero Trust Edge Device Management

Viso provides an advanced, zero trust edge device management to enroll, manage and monitor edge devices. Viso Suite’s zero trust security model for edge devices follows a “never trust, always verify” approach, which means that devices are never trusted by default, even if they are connected to a permissioned network or even if they were previously verified.

The zero trust edge infrastructure of Viso Suite secures access to applications and services based on the confidence of device identity and device health in combination with user authentication.

Deployment Governance

Viso Suite includes access control management for all application resources, providing flexible permissions to define the access rights for custom user roles. This helps organizations manage large teams with different user roles, as well as clearly separate the access to the platform’s AI models, modules, assembly, deployment, change, and governing services.

Role-based Access Control

IT team responsibilities are defined based on roles, and workspace administrators can specify what each role can do in each workspace area. For example, the developer role might not be allowed to push applications to production, while the operations role can.

This flexible model means organizations can map the way they manage the security of their AI vision software portfolio, simplifying the management of several applications.

Does viso.ai Help Customers Build Applications?

Depending on the individual needs, Viso enables organizations to build computer vision on their own and also provides a range of expert services, from advisory to full solution development services.