Managing data is a crucial part of our work with risk and vulnerability. Our platform has built-in security, and all our solutions use an authorization engine with pre-defined roles and corresponding authorities. Countersignatures are used to minimize human errors and prevent fraud. And everything is logged and searchable.
We have an SKF (security knowledge framework) defined as part of the development process. With this, we can identify possible vulnerabilities both before and during development.
External security experts perform vulnerability scans, so-called “Ethical Hacks”, annually on our products to minimize the risk of exploits. We also use “Clair” to perform internal vulnerability scans on our products.