Authenticated account routes
Report history, notifications, API key management, analytics, and workspace actions require authenticated access.
Smart file malware and anomaly scanning
ViroVanta is not positioned as a marketing shell over open file upload. The workspace is designed around authenticated access, ownership-scoped data, and controlled processing paths.
Identity first
Report history, notifications, API key management, analytics, and workspace actions require authenticated access.
User-facing report and analytics retrieval is tied to the authenticated account rather than broad shared access.
Administrative actions are separated from standard user flows and require elevated authorization.
Request handling
Authentication and account-adjacent endpoints use dedicated rate limits to reduce abuse pressure.
Authenticated and security-sensitive responses are marked to avoid unintended browser or proxy retention.
Interactive account operations such as notifications and API key management are restricted to bearer-authenticated sessions.
Scaling posture
Queued scan execution keeps uploads and processing decoupled so workloads can be handled more safely under load.
User history and analytics are stored persistently so decision records are tied back to the account that initiated them.
The platform is structured to keep improving storage, worker isolation, and scanning boundaries as the service scales.
Next step
Use the public scan for evaluation or open an account to see how reports, notifications, and ownership controls behave together.