Move beyond administrative vendor interactions with technology that helps you build strategic supplier relationships. Our platform enables you to apply a consistent and scalable governance framework for key supplier relationships so they can support your organisation’s primary objectives.
Segment suppliers, develop strategic objectives, track sentiment, and build trust.
Identify roles and responsibilities, organise QBRs and track towards key project outcomes.
Apply consistent governance models, onboard suppliers worldwide and build collaborative relationships.
Move beyond basic supplier categories with strategic segmentation. From strategic and JV partners to speciality and niche suppliers or transactional vendors, apply specific governance models that align to the priorities of each segment.
Set the strategic direction of every relationship with supplier account plans. Establish a shared vision, define guiding principles, outline expected behaviours, and organise structured QBRs to keep both sides on track.
Manage a central record on every contact involved in your relationship for true accountability and transparency. Confirm individual responsibilities by division and geography, and create ‘circles’ to align teams with specific initiatives and quickly escalate issues to the right people.
Get real insights into supplier performance with relational, operational and transformational metrics. Follow progress on meeting strategic objectives, track survey results on relationship sentiment and cultural alignment, and identify further opportunities for collaboration.
“Collaboration with suppliers and startups is at the heart of our innovation and growth strategy.”
- Ninian Wilson, CEO, Vodafone Procurement CompanyRead Vodafone’s story
Our team has built Vizibl with security top of mind. We have deployed an array of security features to meet the highest standards for global enterprises and offer you peace of mind.
Vizibl’s data privacy policies are aligned with The General Data Protection Regulation (EU) 2016/697 (GDPR). Vizibl incorporates a Data Processing Agreement (DPA) into the customer Master Agreement. The DPA sets out additional terms, requirements and conditions on which the Processor will process personal data when providing services under the Master Agreement.
All data in Vizibl is encrypted at rest using an AES-256 encryption. Interactions with Vizibl (e.g., API calls, login, authenticated sessions to the customer's portal, etc.) are encrypted in-transit with TLS 1.0, 1.1, or 1.2 and 2,048 bit keys or better. We use industry standard 2048 bit SSL encryption for communications between your computer and our servers.
Vizibl adopts the CREST Infrastructure Security Framework, a rigorous annual assessment of Vizibl’s network for flaws and vulnerabilities at the network and operating system layer. The detailed results of this stringent process are available upon request under a nondisclosure agreement.
Our automated monitoring, alerting and response technologies operate permanently. Our product infrastructure is instrumented to alert engineers and administrators when anomalies or malicious activities occur, including error rates, abuse scenarios, application attacks, and more. Automatic responses and alerts are triggered for our teams to rapidly respond, investigate and correct.
Automated triggers are built into Vizibl to respond to security events. Actions include traffic blocking, quarantine, process termination, and similar functions, which automatically activate at predefined thresholds to ensure the Vizibl platform protects itself.
Vizibl operates a 24/7/365 programme to monitor, log, detect and respond to security alerts. Logs and events are monitored in real time and are escalated immediately at any time to our developers, security analysts and engineers to take appropriate action as members of the Security Operations Team.
All logins, page views, modifications, and other access to Vizibl environments are logged at the application layer. In the infrastructure back-end, we log authentication attempts, horizontal and vertical permission changes, infrastructure health, and requests performed alongside other commands and transactions.
Vizibl’s security and architecture are hosted in Google Cloud which meets the strictest international compliance standards, certifications, laws and frameworks for seamless operations across countries.
Vizibl maintains and regularly tests business continuity and disaster recovery plans that focus on:
Preventing outage through redundancy of telecommunications, systems and business operations
Rapid recovery strategies in the event of an availability or performance issue
Automated encrypted backups every hour and maintained in multiple off-site locations
Vizibl ensures all employees follow the strictest security standards with thorough background screening, contractual confidentiality and ongoing training as we imbue security into company culture.
Vizibl implements security awareness training during onboarding and throughout employment for all employees. Vizibl’s Security Operations team performs progressive social engineering tests and awareness campaigns to build security into the culture of the company. Vizibl’s developers are trained annually on secure coding practices and secure code review techniques.
Employees, contractors, and third-party users must confirm in writing that they understand their roles and responsibilities regarding information security and confidentiality as part of their employment or vendor contract. Upon departure, terminated employees are reminded of their confidentiality obligations with user accounts and passwords immediately revoked.
Background checks are performed on all employees candidates, including financial and criminal records over the past seven years.
Access to Vizibl systems is controlled with strict authentication access for absolute security. Production system access logged locally and in a central log repository.