602-899-1606 or Toll Free 800-720-0304 sales@verticalidentity.com

2323 E Magnolia St #116

Phoenix, AZ, US.

Mon - Fri 8.00 - 5.00


Customer Inquiry

Hello, I’m Vertical Identity’s

Technology & Data Security Details

User-Friendly Web-based Software Solution 

Our “Software as a Service” background check software, gives you fast, easy, web-based system to order reports, manage applicants, and access information.

Our Background Check Software Provides:

  • Web-based order management and status tracking
  • Gateway to your applicant tracking system
  • Reduction of data entry
  • HTML or PDF Reporting 
  • Speedy turnaround times
  • Comprehensive online Resource Library containing downloadable
  • FCRA froms, Adverse Action Letters, Summary of Rights, and other  Screening, Recruiting, and Staffing related content. 
  • User Manuals and QuickStart Guide


  • Easy to access and understand
  • Accurate and timely
  • Real-time status updates
  • Industry leading turnaround times  

Want to use a Traditional System?

We are okay with that. Clients that do not wish to use the online system to place orders may instead send their orders by fax. There is no additional charge for this option. Our Vertical Identity Team will enter faxed orders into the system during regular business hours.

Our Data Center:

Our data platform servers are housed in an SSAE16 SOC 2 Type 2 audited data center, located in Phoenix, AZ. The facility is monitored by high-definition cameras and staffed by on-site security personnel 24 x 7. Phoenix is a location favored by global firms. Why? No floods. No ice storms. No earthquakes. No hurricanes.

 Our Servers and Applications:

The platform application and your data reside on modern high-availability servers, protected by multi-level firewall and intrusion detection technology. Vulnerability scans are conducted on a regular basis by a PCI Approved Scanning Vendor. Full system backups are performed nightly. Incremental backups are performed on a continuous basis throughout the day. Backup system copies are encrypted and immediately moved to an equally secure facility on a daily basis. All data transmission to and from the servers, including XML traffic, is encrypted using SSL certificates issued and managed by Thawte.

Access, Control and Change History

Vertical Identity fully supports the Multi-factor authentication requirements of the three major credit bureaus and other providers of sensitive data. The system also enforces the use of strong passwords, login timeouts and password expiration. 

We can assign 20 unique user rights to each staff member and 6 unique rights to each user, enabling an exact match of privilege and responsibility. When necessary, you can immediately deny access to any user by simply contacting us. 

The system automatically logs all transaction activity by username, providing a complete Change History audit trail that is immediately available to you. So, you will always know who touched each record and exactly what that user did to it.