Our infrastructure’s security technology is upgraded continuously

  • We design our SaaS applications on infrastructure from our partners IBM and Microsoft Azure. They are ISO 27001 and CSA Star certified.
  • Our datacenters (Category Tier3) are located worldwide and protected by a full suite of anti-intruder systems. They are coordinated from a center in France.
  • We regularly assess the performance and evolution of our ISMS* via constant monitoring, regular performance checks, and internal audits at planned intervals.

*Information Security Mangement System

ISO 27001 and CSA certifications: certified trust

These certifications, widely recognized in the Cloud industry, include a battery of legal, physical, and technical inspections of information risk management and confirm the quality of implementation and continuous improvement of our ISMS*.

The Cegid IBM Cloud and Microsoft Azure Cloud are ISO 27001 certified and the Microsoft AZURE public Cloud is CSA Star certified.

Our ISMS * is ISO 27001 certified for SaaS application and client data hosting..

*Information Security Management System

Explore our security assurance plan

R&D: the key to maintaining our high level of security

Continuous improvement

  • Improving our operational processes enables us to meet the security standards’ requirements (automation, devops process, etc.).
  • Data security on migration paths is integrated into our operational processes.
  • GDPR compliance is covered both technically and contractually and is coordinated by our DPO (Data Protection Officer).

Security by design

We are always looking for new security practices:

  • We perform targeted security intelligence and regularly send news and updates to our teams.
  • Our security officers ensure that the development teams apply best practices for security.
  • development committee and working groups that bring together all the Cegid teams involved in our products’ life cycles are tasked with continuous improvement.

The Cloud: improving security

When combined with the right security solutions, the Cloud offers the best guarantees for open yet secure networks and infrastructure.

Choose experienced security professionals to protect your data

  • Incidents and data are monitored in real time. Our teams identify, evaluate, and correct any vulnerabilities to limit exposure to attacks.
  • The Cloud process operational systems are monitored, analyzed and improved from end to end, 24/7.
  • The teams are regularly trained on security and confidentiality best practices (integration process, methods, etc.) and ensure compliance with the security rules. They are committed to keeping your data confidential and to using it exclusively for service implementation.
  • Finally, a close partnership with the DevOps teams ensures that you are protected by a consistent, high-performance, holistic IT security policy.

Choose a cutting-edge technological foundation

We bring you the best Cloud technologies on the market, thanks to our partnerships with renowned international leaders. We combine and customize their expertise to better serve your business.

Find out more