Back to all FAQs
Security
For example, we use software such as Honeycomb to monitor our systems. We also have defined change management procedures to control and document changes to the software in order to minimize security risks.
We collect, store and analyze log data in accordance with the requirements of our ISO 27001 certification. Our Incident Response Plan, which is also part of this certification, includes clearly defined steps for detecting, reporting and responding to security incidents.
In addition, we conduct regular vulnerability scans and offer a bug bounty program. We reward relevant, confirmed security vulnerabilities reported to security@luminovo.com to help identify and fix potential threats early.