ISO 27001 Certification

Security is Important to Asavie

Asavie ISO certified means wmanage information security based on the ISO 27001 framework so you have confidence in our ability to management the requirements of secure connectivity. The ISO 27001 standard helps organizations to establish, maintain and continually improve an Information Security Management System (ISMS). The information security management system preserves the confidentiality, integrity and availability of information by applying a risk management process. 

Certification Logos 2-02
Quote Icon-03

Security is in our DNA and at the heart of our operations. We have a strong belief that unless you are a security professional you should not need to know about the security. Our systems take care of making secure connectivity simple.

Tom Maher
Asavie CTO and Co-Founder

Asavie’s information systems and technical infrastructure are hosted in ISO27001 certified data centres. Physical security controls at our data centres include 24×7 monitoring, cameras, visitor logs, entry requirements, and dedicated locked cages for Asavie hardware. The Information Security Management System (ISMS) that supports the development, deployment and operation of solutions for external customers by the Asavie team is ISO27001 certified.

ISO 27001 Certification

ISO 27001 is the international standard outlining best practices for information security management systems. Compliance with these standards demonstrates our commitment to continuously improving, our processes and solutions. Asavie security is paramount to our success so we will ensure we deliver our solutions and products to you under the ISO 27001 Certification Guidelines. Find out more about how Asavie can help your business comply with GDPR: 

GDPR and Mobile Security

A lot of IT departments are primarily focusing on protecting the data within their organization. But there is nothing unusual about an employee using their smartphone or tablet to access sensitive customer or company data. Now with GDPR, businesses will be obliged to demonstrate that they are implementing all reasonable efforts to protect mobile devices both in terms of physical access to the device, and when the device is being used online to access data. Mobile security will no longer be a nice to have, it will be a necessity.