FREE TRIAL

Keypro Data Security

We are certified for Quality and Information Security in all our operations

 

 

Your data is safe with us

Keypro is certified for ISO 9001 quality and ISO 27001 information security
 
 

General security

Security is a set of continuously developed processes and practices designed to protect critical information technology ecosystems. This included software, files, applications, databases, accounts, networks, offices and people. Effective security adopts a set of processes, controls, applications and techniques that identify the importance of data assets and apply the most appropriate security controls.

Security icon 2

Physical Security

Keypro has access control systems in all physical offices and software environments audited by third party

Security icon 2

Security Management

Keypro has implemented safety management model and dedicated responsible persons to ensure security

Security icon 2

Network control

Keypro products and software environments include network control components to maintain security

Security icon 2

Availability

All information in different systems are available and accessible to only authorized persons at all times

Security icon 2

Reliability

Keypro uses leading security equipment and software solutions to ensure and develop reliability

Security icon 2

Monitoring

Environments are monitored all times with modern tools for both operational and security aspects

Security icon 2

Encryption

Information is encrypted in various sources eg. databases, backups, data transfer etc.

Security icon 2

Protection

Keypro implements security mechanisms in many different levels from network level to product level

Security icon 2

Privacy

Keypro products and services guarantee the principles of privacy and European Union GDPR requirements

Security icon 2

Control

Keypro effectively controls and monitors all software systems, data flows and capacity

 

Security development

Security is a continuous process involving people and practices, and ensuring confidentiality, integrity, and availability. Secure environment is the result of security development processes where security is built in and thus everything is developed with security in mind

Security icon 2

Certificates

Keypro has ISO 27001 information security and ISO 9001 quality certificates and is certified throughout the company.

Security icon 2

Audits

Keypro's information security and quality is constantly audited by third party company who tests, inspects and certifies operations

Security icon 2

Incident management

Keypro has implemented incident management which is part of information security processes

Security icon 2

Risk identifying

Keypro has implemented risk identifying and management which is part of information security processes

Security icon 2

Vulnerability identifying

Keypro uses technology in different environments and SaaS services to identify vulnerabilities.

Security icon 2

Updates

Keypro monitors updates from different authorities, system / hardware vendors and software companies

 

Operational security

Operational Security is the effectiveness of controls to prevent sensitive information from getting into the wrong hands. These include access controls, authentication, and security topologies applied to networks, systems, and applications.

Security icon 2

Access management

Keypro software products includes user management and different access roles to users

Security icon 2

Authentication

Keypro uses different highly secure authentication methods in products such as MFA and SSO

Security icon 2

Data protection

Keypro software solution data is encrypted from the data origin to the data transfer end point

Security icon 2

Recovery

Keypro has standardized backup and recovery processes to maintain customer data availability

Security icon 2

Tracking

Keypro monitors the operation and security of the systems with separate dedicated systems, both ourselves and our partners.

Security icon 2

Logging

Security logs are collected and managed in a centralized log manager for further analysis

 

Want to learn more?

Check out our information security blogs here.

3 min read

Development of information security at Keypro

MDM, SIEM / SOC, EDR, NDR, ISO27001, NOC, SOC2…Word...

Get In Touch

Send us your email and we'll reply ASAP.