EPOS Manager
Save time and drive efficiency through remote update deployments and get insights into how to improve workplace productivity.
EPOS Digital Solutions are built for data security and compliance.
EPOS is committed to applying the highest security and compliance standards when it comes to your data. Internal and external processes and third-party audits are all set up to make EPOS a secure and trusted partner.
EPOS protects your data at rest and in transit in your on-premise or cloud deployments. Enterprise-grade security with rigorous controls ensures safe and efficient management of your EPOS devices. Baseline requirements follow best practices within the development and hosting of the solutions we offer to our customers.
EPOS is GDPR compliant and uses the System and Organization Control (SOC) Type I as a framework for yearly audits. These audits verify the top-level security in data storage as well as internal security policies, processes and employee onboarding and training.
The purpose of the SOC II report is to help you understand the controls established by EPOS to support operations and compliance.
Our products comply with mandatory EU directives through either an EU DOC (self-declaration) or an EU type examination certificate.
Building and maintaining trust with our customers, partners, and suppliers, are a top priority for EPOS. Our products aim to comply with relevant legislation that requires an appropriate reaction to software vulnerabilities.
EPOS vulnerability disclosure Policy follows the IoT Cybersecurity standard ETSI 303 645.
This policy includes:
Contact software support with your concerns about security and vulnerabilities with subject line: vulnerability_report
What You Can Expect
When we receive a report of a possible vulnerability through the EPOS Security and Compliance Center, this is what the sender can expect regarding getting an answer:
Our Procedure
The triage of these reports will be done by our Vigilance Evaluation Board, using our internal Procedure called G-600 Vigilance.
The board has a system of vigilance that evaluate the vulnerabilities reports that come in.
They are scored on two parameters 1) Severity of thread & 2) Likelihood of the vulnerability being used.
For More Information
Please also contact us, if you want to hear more about the way we perform this triage, and how the Vigilance Board operates. This could be in the event of a Request for Proposals etc.