Last updated on May 12, 2022

Security Overview


All LVT employees undergo regular security training to ensure that security is always a central focus. Security training covers topics such as phishing detection, physical security best practices, cybersecurity best practices, and more. Additionally, access to all of our internal systems is controlled by a comprehensive identity and access management system, which utilizes single sign-on and multi-factor authentication (MFA).


LVT infrastructure is only accessible via a hardened virtual private network (VPN) connection, which requires an active account protected by MFA to authenticate. Access to the LVT cloud environment is restricted by job role and the principle of least privilege and is enforced by a comprehensive identity and access management system. Our state-of-the-art advanced analytics tools detect threats or vulnerabilities to the LVT infrastructure.


Edge systems are connected to the LVT Platform via a private network with various internet service providers (ISP). The private network connection with the ISPs ensures that communication between the edge unit and the LVT Platform is private and secure.


The LVT Platform uses role-based access controls to ensure that users only have access to the resources they need. The portal supports SAML and sign-in with Google for organizations wishing to use their own identity provider. All connections to our web portal are encrypted using TLS 1.2.


You can find more information about our vulnerability disclosure practices here.