We ensure continuous security
We continuously monitor and evaluate the implementation of and compliance with policies, standards, guidelines, and objectives through our robust Information Security Management System (ISMS).
![External/Internal pentests](//images.ctfassets.net/utbwtwojmk5p/5VjYFfnrbTzm6ycjuvJ0dn/c3eab29bdc1588cc4579e22452432552/int-ext-pentests.png)
External/Internal pentests
We perform internal and external penetration tests/ security assessments and vulnerability scans to validate the effectiveness of our controls.
![Operational security](//images.ctfassets.net/utbwtwojmk5p/6pS7B6QpQMh0MCin8yZH0g/853a9ec3136bbb83511bb71e2b77cb09/operational.png)
Operational security
We maintain a formal information security management program with a dedicated team reporting to Fourthline’s Head of IT Security.
![Built-in security](//images.ctfassets.net/utbwtwojmk5p/UysBPigu0pNxJZ8NTU9SB/13bea46502d1f36450949900e7b2dc43/built-in.png)
Built-in security
We embed security controls in all stages of the software development lifecycle – from requirements engineering to incident management.