Renumics has had its information security measures assessed with the TISAX assessment, achieving an important milestone in the company's information security. The results are available at https://enx.com/TISAX/tisaxassessmentresults. TISAX (Trusted Information Security Assessment Exchange) is a standard for information security in the automotive industry, developed by the ENX Association on behalf of the VDA (German Association of the Automotive Industry). It provides a uniform assessment of information security recognized by companies in the automotive sector.
Information Security Policy as a Foundationโ
Our customers entrust us with their data and expect solid IT security and corresponding processes. The importance of information security for our business success is reflected in our information security policy, which defines the basic requirements for information security:
- The confidentiality, integrity, and availability of our customers' data must be ensured
- Our trade secrets must be protected
- Legal requirements, contracts with customers and partners, and not least the data protection laws must be complied with
- Software must be developed, delivered, and managed securely.
Risk Management and Security Measuresโ
A key component of information security is risk management. Renumics regularly conducts risk analyses to identify potential threats and take appropriate measures to mitigate them. These measures, evaluated by the TISAX audit, include technical, organizational, and personnel security precautions tailored to the specific needs and risks for computer-aided process automation in engineering processes.
Key Topicsโ
Numerous topics were evaluated as part of the TISAX audit. Here are some examples:
- Renumics relies on trusted and certified suppliers to ensure the security of suppliers and cloud services. The approach to selecting suppliers and cloud services is defined in the information security concept.
- In software and software development, open source software is used, with the software components used being regularly reviewed. Comprehensive guidelines for software development apply, and compliance is documented for each project.
- Data protection and data security are ensured not only in the application of ML models but also in training on large data sets and in the development of assistance systems.
- Finally, rules for IT infrastructure and network security are documented to ensure a secure network configuration.
Added Value for You as a Customerโ
Thanks to our comprehensive information security measures, you can be sure that your sensitive data is protected with us. We offer you reliable and secure software solutions that meet the highest security standards. In addition, we are always prepared to respond quickly and effectively to new threats to ensure the security of your data at all times.