Our answer in
Security
In Wholemeaning always
We Provide Security and Confidence to All Our Clients
We developed a robust environment for our product, where we define and demand internally, implement the best practices of security and information processing in all our operations. Among our partners that help us achieve our goals are:
Security and Defense Area
We have an area that strategically and proactively aligns security objectives and operational and business risks, in turn monitoring, continuity and managing the implementation of ISO/IEC 27001 and SOC 2 Type II standards and audits.
Trust and Security
All your data and our internal processes are being managed securely and in accordance with the standards that the industry and companies demand.
Certified and Audited
We reinforce our status as reliable partners or suppliers for different organizations that have high information security standards, in our commitment we have security policies, processes and standards which are rigorously audited year after year.
We take responsibility and manage information and processes safely with our clients.
In general terms, with the implementation of ISO 27001 and SOC 2 we seek to adapt the controls designed to the infrastructure, software, processes, people and data, implementing controls around:
Protect the data of our customers
By evaluating and minimizing security risks, as well as complying with legal and regulatory requirements in different countries.
Comply with all required standards
That satisfies the following "Trust Services Criteria": security, availability, integrity, confidentiality and privacy.
Remote worker integration
Cloud Infrastructure Security and Access Control Restrictions, including strict password enforcement.
Detection of threats and unwanted events
Review of user access, change management procedures, asset management and data encryption.
We take responsibility and manage information and processes safely with our clients.
In general terms, with the implementation of ISO 27001 and SOC 2 we seek to adapt the controls designed to the infrastructure, software, processes, people and data, implementing controls around:
Protect the data of our customers
By evaluating and minimizing security risks, as well as complying with legal and regulatory requirements in different countries.
Comply with all required standards
That satisfies the following "Trust Services Criteria": security, availability, integrity, confidentiality and privacy.
Remote worker integration
Cloud Infrastructure Security and Access Control Restrictions, including strict password enforcement.
Detection of threats and unwanted events
Review of user access, change management procedures, asset management and data encryption.