Concero’s information privacy and security services are built upon a comprehensive Information Security Management System (ISMS) consistent with ISO 27001: an internationally recognized information security standard: ISO 27001. Our Security Team is led by our Chief Security Officer, Security Committee, and Information Security and Privacy Officer. They are responsible for implementing and enforcing our ISMS to help safeguard the confidentiality, integrity and availability your (and our) information assets.
Some of our key ISMS policies and procedures are:
- Risk Management and Assessment Policies
- Internal Information Security Awareness and Training Policy
- Internal Information Classification and Protection Policy
- Internal System Security Audit Policy
- Criminal Record Checks of All Employees
- Employee Onboarding and Role Change Checklists
- Acceptable Use Policy (AUP) for All Staff and Customers
- Centralized Identity and Permission Management
- Physical and Logical Access Policies
- Datacenter Security and Operations Manual
- Password Management Policy
- System Update and Patching Policy
- Data Encryption Standards
- Windows and Linux Servers Configuration Standards
- Change Management Policies
- Incident Management Policies
System and application-level vulnerability scans are performed routinely on internal systems and we are often subject to third-party security audits and penetration testing.
From a security services point of view, Concero delivers robust services consistent with our ISMS and or defend in-depth philosophy. These security services include:
- Active Directory Access and Permission Management
- Two-Factor Authentication
- Network and Host Firewall Management
- Application Firewall Management
- Intrusion Detection Services
- Centralized Log Management
- Denial of Service (DoS) Protection
- Vulnerability and Compliance Scanning
- Patch Management
- Anti-Virus/Anti-Malware Services
- SSL Cert and Key Management