Meta tags:
Headings (most frequently used words):
and, security, data, development, regulatory, compliance, documentation, employee, commitment, incidents, storage, third, party, services, confidentiality, privacy, by, design, networking, in, mobile, applications, continuous, improvement, memy, friendssecurity, software, cycle, separation, of, environments, monitoring, logging,
Text of the page (most frequently used words):
and (39), the (26), security (19), data (17), that (13), are (11), all (10), our (7), information (7), for (6), procedures (6), #applications (6), incidents (6), iso (5), 27001 (5), ensure (5), development (5), with (5), implemented (5), isms (5), design (5), services (5), this (4), have (4), make (4), access (4), code (4), confidentiality (4), based (4), privacy (3), can (3), respond (3), immediately (3), any (3), sure (3), always (3), every (3), standards (3), verified (3), best (3), encrypting (3), appropriate (3), architecture (3), rules (3), compliant (3), mamf (3), accessibility (2), statement (2), policy (2), investor (2), relations (2), management (2), system (2), employees (2), internal (2), external (2), audits (2), test (2), update (2), processes (2), continuous (2), logging (2), application (2), comprehensive (2), also (2), monitoring (2), properly (2), production (2), environments (2), from (2), both (2), separate (2), policies (2), through (2), automated (2), tests (2), well (2), detected (2), which (2), high (2), detailed (2), requirements (2), subsequent (2), software (2), cycle (2), practices (2), described (2), storage (2), using (2), tls (2), encrypted (2), mobile (2), confidential (2), accessed (2), only (2), persons (2), whom (2), necessary (2), redundancy (2), reduced (2), guarantees (2), protection (2), personal (2), gpdr (2), reported (2), documentation (2), contact (2), gdpr, know, ensuring, ongoing, process, constantly, looking, areas, improve, end, regularly, train, conduct, improvement, proper, network, events, view, current, stability, status, place, dedicated, team, issues, arise, completely, separated, each, other, physically, logically, means, they, different, machines, networks, separation, change, made, environment, goes, set, beforehand, routine, manual, warns, logical, errors, coding, style, violations, helps, maintain, quality, meets, clearly, captured, phase, then, stages, testing, review, entire, implementing, devops, concept, stage, obfuscation, avoiding, keys, source, communications, ssl, pinning, databases, files, stored, storing, sensitive, format, such, connection, between, transmitted, networking, consider, measures, starting, creation, verify, them, project, phases, select, recommend, vetted, servers, located, within, european, union, centers, cloud, solutions, try, use, region, third, party, established, responding, potential, allow, promptly, designated, individuals, upon, receipt, report, find, solution, problem, accordance, customers, continuously, documented, tools, being, prevent, similar, future, extensive, part, aware, their, responsibilities, regarding, regular, training, organized, purpose, employee, commitment, sufficiently, level, entrusted, clients, priority, therefore, regulatory, compliance, friends, technology, career, case, studies, sports, home,
Text of the page (random words):
mamf security contact us home sports services case studies career iso 27001 investor relations privacy policy gpdr accessibility statement security technology contact me my friends security regulatory compliance at mamf we make the security of the data entrusted to us by our clients a priority therefore based on best practices we have implemented an information security management system isms that is compliant with iso 27001 an iso 27001 compliant isms guarantees a sufficiently high level of information and personal data security documentation and employee commitment all processes and policies are detailed in the extensive documentation that is part of the isms all mamf employees are aware of the rules and their responsibilities regarding data protection and information security regular training and audits both internal and external are organized for this purpose security incidents we have established procedures for responding to potential security incidents which allow us to respond promptly to any reported or detected incidents appropriate designated individuals respond immediately upon receipt of a report and find a solution to the problem in accordance with the procedures described in the isms all incidents are immediately reported to the customers we continuously test and update all procedures all incidents are also properly documented with tools and procedures being implemented to prevent similar incidents in the future data storage and third party services all services we select and recommend are vetted to ensure information security and confidentiality of personal information we make sure that servers are located within the european union in data centers compliant with gpdr and iso 27001 standards for cloud solutions we always try to use an eu based region confidentiality appropriate architecture and design of applications and implemented data access rules ensure that confidential data can be accessed only by persons for whom it is necessary data redundancy is verified and reduced privacy by design we consider all data protection measures starting from the creation of the information architecture and verify them in subsequent project phases networking we make sure that every connection to our services and between services is encrypted using tls this guarantees the comprehensive security of the data transmitted in our applications appropriate architecture and design of applications and implemented data access rules ensure that confidential data can be accessed only by persons for whom it is necessary data redundancy is verified and reduced data security in mobile applications we design mobile applications based on the best security standards such as storing sensitive data in an encrypted format encrypting data and files stored in the application encrypting databases encrypting all communications using tls and ssl pinning avoiding storage of access keys in the source code code obfuscation development software development cycle the entire software development cycle is based on best practices and procedures described in the isms by implementing the devops concept we ensure security and confidentiality at every stage of design and development detailed security requirements are clearly captured in the requirements phase and then verified in subsequent stages through automated testing and code review the implemented ci warns of any logical errors detected as well as coding style violations which helps us maintain high quality code that meets security and data confidentiality standards every change made in the production environment goes through a set of automated tests beforehand as well as routine manual tests separation of environments we make sure that the production and development environments are always completely separated from each other both physically and logically this means that they are always on different machines on separate networks with separate access policies monitoring and logging we ensure proper logging of all network and application events so that we have a comprehensive view of the current security and stability status of all our applications we also have continuous monitoring in place so that a properly dedicated team can respond immediately to any issues that arise continuous improvement we know that ensuring security is an ongoing process so we are constantly looking for areas to improve in our information security management system to this end we regularly train our employees conduct internal and external audits and test and update our procedures and processes iso 27001 investor relations privacy policy gdpr accessibility statement
|