Because your security is important to us, we deal extensively with the topic of IT security and IP rights. We have therefore established clear rules and guidelines.
Cyber security is part of a sustainable corporate strategy. After all, security incidents can bring your business to a complete halt. In addition, it is also important for your customers that continuous operation on the one hand and also data protection on the other are always ensured. At encoway, we place a special emphasis on this topic and would like to give you an insight into our rules and guidelines.
Highly professional IT operation
All operational IT services used by encoway are either sourced from internationally recognized companies or provided by the Lenze Group’s central IT service provider “BHN Dienstleistungs GmbH & Co. KG” centrally provided in the Lenze Group. BHN Dienstleistungs GmbH & Co. KG specializes exclusively in IT operations and has extensive know-how in the secure operation of global IT solutions. In addition, BHN is certified according to ISO 27001.
All traffic is filtered per malware protection, security and access policies.
A market-leading application layer firewall protects against unknown malware, zero-day threats, and targeted attacks from undetected exploits.
Backup and Recovery
The company-relevant data statuses are backed up regularly. This backup is stored in a tamper-proof manner, so that no malware can retroactively influence data from the past.
The workforce is regularly informed and explicitly instructed about new developments in the context of “cyber security”.
Code of Conduct – IT Security Part
For a long time now, the topic of IT security has been a basic component of general behavioral instruction throughout the Lenze Group.
Processes and communication for emergencies
If the threat situation changes, a task force will be established at short notice. The signaling paths are predefined and set for analog communication.
Critical systems that are available outside the DMZ are usually protected against foreign access via multifactor authentication.
All mobile devices/computers are equipped with an encryption process.
End devices from external
Third-party end devices (e. B. smartphones, USB sticks, other private hardware) are generally not integrated into the company network.
IP protection rights
Not only IT security is an important issue for you and your customers. International property rights may not be infringed by software under any circumstances. Otherwise, it can be extremely expensive and time-consuming for software users. Damages often amount to several million euros. If the IP rights violations are not settled with the software provider, the software user is often left to bear the costs. After all, the software user has the burden of proof.
With encoway, you have a partner at your side who is aware of this fact and is positioned accordingly: In cooperation with our parent company Lenze, we follow established and professional processes to manage this risk. This involves regular screenings of existing and newly filed property rights (e.g. patents) by product management experts. In the case of “Findings”, clarification processes are actively initiated and, in addition, a defense of the company’s own property rights is undertaken in the case of inappropriate applications. This way you are always on the safe side.
Do you have any questions?
Then please feel free to contact us.