Built for elite manufacturing procurement.
Every plant we work with operates under regulator-level security expectations — DPDP, GDPR, OISD, ADNOC HSE, Aramco SAES. Drona VR's security posture is calibrated to those expectations from day one. Customer data tenanted in the geography of the customer's choice. Encryption end-to-end. MDM-managed devices. Audit-trail records in regulator-acceptable format.
How Drona VR security maps to procurement-team checklists.
Every enterprise procurement team asks the same security questions during VR vendor evaluation. Below is how we answer each, at a level appropriate for a platform overview. The full security posture lives at /trust/security/.
Encryption end-to-end
TLS 1.2 minimum on customer-facing surfaces, TLS 1.3 where supported. AES-256 at rest in customer-tenanted databases.
Least privilege, MFA, audit log
Role-based access. MFA required for all employee accounts. Privileged-action audit log retained 12 months minimum.
Customer-tenanted regions
Customer data in the geographic region requested by the customer (India / US / EU). Tenant isolation at infrastructure layer.
WAF, DDoS, rate-limit, bot management
Cloudflare WAF. AWS Shield. Rate-limiting on all public endpoints. Bot fingerprinting for non-search traffic.
MDM enrolment for headsets
Headsets enrol in customer MDM (Workspace ONE, Intune, Vive Business). IT retains policy, network and remote-wipe control.
Regulator-format records
Operator ID, scenario, completion timestamp, scoring rubric, supervisor sign-off — formatted for DGMS, OISD, USFDA, OSHA, EU GMP.
Sub-processor DPAs
All sub-processors assessed for security and privacy posture. Data Processing Addendums in place with each. Annual review.
Disclosure programme + runbook
Coordinated disclosure via security@dronavr.com. Documented incident response runbook. Regulatory notification within statutory timelines.
Backups, DR, business continuity
Daily backups with offsite copies. Documented disaster-recovery procedure. Annual continuity test for critical paths.
Need the full security pack?
Audit reports, sub-processor list, DPA templates, security questionnaires available under NDA.
Train the work where mistakes are not optional.
Book a 15-minute discovery call. We will walk you through a module live, on a real headset, with your SOP language.