Back to all FAQs
Security
For example, we use software such as Honeycomb to monitor our systems. We also have defined change management procedures to control and document changes to the software in order to minimize security risks.
We collect, store and analyze log data in accordance with the requirements of our ISO 27001 certification. Our Incident Response Plan, which is also part of this certification, includes clearly defined steps for detecting, reporting and responding to security incidents.
In addition, we conduct regular vulnerability scans and offer a bug bounty program to identify and remediate potential threats at an early stage.