Security and the Cloud: choose digital trust
Our defense and risk anticipation techniques incorporate a suite of technological, operational, and organizational processes that cover the entire data chain, from software publication to hosting. That give us end-to-end control so we can bring your data the level of security only an industrial players can offer.
Our infrastructure’s security technology is upgraded continuously
- We design our SaaS applications on infrastructure from our partners IBM and Microsoft Azure. They are ISO 27001 and CSA Star certified.
- Our datacenters (Category Tier3) are located worldwide and protected by a full suite of anti-intruder systems. They are coordinated from a center in France.
- We regularly assess the performance and evolution of our ISMS* via constant monitoring, regular performance checks, and internal audits at planned intervals.
*Information Security Mangement System
ISO 27001 and CSA certifications: certified trust
These certifications, widely recognized in the Cloud industry, include a battery of legal, physical, and technical inspections of information risk management and confirm the quality of implementation and continuous improvement of our ISMS*.
The Cegid IBM Cloud and Microsoft Azure Cloud are ISO 27001 certified and the Microsoft AZURE public Cloud is CSA Star certified.
Our ISMS * is ISO 27001 certified for SaaS application and client data hosting..
*Information Security Management System
R&D: the key to maintaining our high level of security
- Improving our operational processes enables us to meet the security standards’ requirements (automation, devops process, etc.).
- Data security on migration paths is integrated into our operational processes.
- GDPR compliance is covered both technically and contractually and is coordinated by our DPO (Data Protection Officer).
Security by design
We are always looking for new security practices:
- We perform targeted security intelligence and regularly send news and updates to our teams.
- Our security officers ensure that the development teams apply best practices for security.
- A development committee and working groups that bring together all the Cegid teams involved in our products’ life cycles are tasked with continuous improvement.
Choose experienced security professionals to protect your data
- Incidents and data are monitored in real time. Our teams identify, evaluate, and correct any vulnerabilities to limit exposure to attacks.
- The Cloud process operational systems are monitored, analyzed and improved from end to end, 24/7.
- The teams are regularly trained on security and confidentiality best practices (integration process, methods, etc.) and ensure compliance with the security rules. They are committed to keeping your data confidential and to using it exclusively for service implementation.
- Finally, a close partnership with the DevOps teams ensures that you are protected by a consistent, high-performance, holistic IT security policy.
Choose a cutting-edge technological foundation
We bring you the best Cloud technologies on the market, thanks to our partnerships with renowned international leaders. We combine and customize their expertise to better serve your business.