/

security

Enterprise-Level Data Security

Experience peace of mind with o9 Solutions’ data security and compliance focus. 810 is the perfect rating we achieved in the industry from BitSight.

o9 Digital Brain™ platform

Security features for more control, visibility and flexibility

o9 employ state-of-the-art internet security measures to ensure customer’s and o9’s data is safe and accessible anytime, anywhere. Our commitment to security spans our entire operation, guaranteeing robust protection for both you and our company.

Key o9 Security Capabilities for Enterprises

Enhance security in o9 by enabling access only for authorized individuals and approved devices. We achieve this through features like single sign-on, domain claiming, and support for enterprise mobility management.

certifications

Compliance Certifications
and Frameworks

  • ISO/IEC 27001

    It is an international standard for managing information security.

  • ISO/IEC 27017

    Security Controls for the provision and use of Cloud Services

  • GDPR

    It is a regulation in EU law on data protection and privacy in the European Union (EU) and the European Economic Area (EEA).

  • CCPA

    The California Consumer Privacy Act (CCPA) gives California consumers more control over their personal information.

  • C5

    C5 helps organizations demonstrate operational security against common cyber-attacks when using cloud services within the context of the German Government's "Security Recommendations for Cloud Providers".

  • NIST CSF 1.1

    It is the Cybersecurity Framework focused on refining and strengthening cybersecurity practices. It provides comprehensive guidance for organizations to identify, protect, detect, respond to, and recover from security threats, aligning their strategies with industry standards and best practices.

  • SOC 1

    A SOC 1 engagement is an audit of the internal controls that a service organization has implemented to protect client data, specifically internal controls over financial reporting.

  • SOC 2

    SOC 2 is an audit that assesses the effectiveness of a service organization's controls over a specific time period, providing insights into both their design and performance to ensure compliance with security and privacy standards. It offers a comprehensive view of control sustainability.

  • TISAX

    TISAX is a standardized system for assessing and ensuring information security in the automotive industry supply chain. It enhances data protection and trust among suppliers and service providers.

our approach

Security and Compliance
Framework

Industry-accepted best practices and frameworks

Our security approach focuses on security governance, risk management, and compliance. This includes encryption at rest and in transit, network security and server hardening, administrative access control, system monitoring, logging and alerting, and more.

Transparency and Accountability

We prioritize transparency and accountability when it comes to security and compliance. If you have questions or need more information, please don't hesitate to contact us. We value Customers' trust and are committed to protecting their data and ensuring a secure environment on our platform.

policy

Security Vulnerability
Disclosure Policy

If you discover a security vulnerability, please report it confidentially according to our Vulnerability Disclosure Policy. We value responsible disclosures and will work with you to promptly investigate and address reported issues. For details on reporting and our handling process, see our full policy.