[av_revolutionslider id=’25’]

Data Privacy and Security

Recognizing the priority of Information Security and Data Privacy for our partners and clients, Ezwim has taken the necessary measures to gain ISO 27001 certification for our company, technology, and services. In a world where businesses save sensitive information in the cloud, trust in cloud-based service suppliers is quintessential. By obtaining the ISO 27001 certificate, Ezwim proves to be on the forefront of success through security best-practice and ensures that your data is secure, always.

The ISO 27001 certification formally specifies procedures that bring information security under explicit management and control. Since 2013, Ezwim is proud to be amongst the few TEM vendors in the world obtain and maintain this certification through annual audits from outside certification firms. The ISO certificate proves our commitment to data security along with our passion for innovation. Ezwim takes all necessary measures to keep your sensitive data secure so you can stand behind your own security commitments and policies.

The ISO 27001:2013 standard

ISO 27001 consists of the following elements:

1. Security Policy – Management direction
2. Organization of Information Security – Governance of information security
3. Asset Management – Inventory and classification of information assets
4. Human Resources Security – Security aspects for employee onboarding, change management, and termination
5. Physical and Environmental Security – Protection of technology facilities
6. Communications and Operations Management – Management of technical security controls in systems and networks
7. Access Control – Restriction of access rights to networks, systems, applications, functions and data
8. Information Systems Acquisition, Development and Maintenance – Architecting security into applications
9. Information Security Incident Management – Anticipating and responding appropriately to information security breaches
10. Business Continuity Management – Protecting, maintaining, and recovering business-critical processes and systems
11. Compliance – Ensuring conformance with information security policies, standards, laws, and regulations