VIKTOR offers an industry-leading platform for companies to design, build, deploy and manage automation applications. Being a platform provider, it is of utmost importance to ensure that the platform itself, the applications built on the platform and the cloud operations running the platform meet the highest security standards. Delivering an innovative and secure application platform is the result of comprehensive planning, innovative design, and efficient operations. VIKTOR makes security a priority at every step, from code development to incident response.
VIKTOR has combinations of controls and principles to maintain the confidentiality, integrity and availability of the VIKTOR platform and customer data.
These controls include:
- Strict access controls on sensitive data, including two-factor authentication or certificate-based authentication to perform sensitive operations.
- Background verification checks on operations personnel involved with customer data.
- Multiple levels of monitoring, logging and reporting, including self-service tools embedded within the VIKTOR platform.
- A software development lifecycle which embeds security requirements into systems and software through the planning, design, development and deployment phases.
These principles include:
- All codes generated by your developers is your IP
- You create ownership of all Data generated and stored on the VIKTOR platform
- We provide enterprise level SLA’s
- The data security and location is conform enterprise and government standards
- We can provide Cloud ESCROW arrangements to guarantee continuity