How does EZ Factory monitor the security of the EZ-GO platform?

Security of systems and data is EZ Factory's top priority. The EZ-GO platform (the SaaS environment) is monitored 24/7 for deviant behavior. If something abnormal is detected, we investigate and mitigate it immediately. We go to great lengths to achieve this, because security is the most important precondition for our platform.

Security Operations Center

Central to our security policy is the Security Operations Center (SOC). This is a close collaboration between the EZ Factory IT department and our partner IP4Sure.

The SOC is the alarm center for our systems and IT environments. Through so-called next-generation solutions (in which AI plays a role, among other things), the SOC monitors all data flows, endpoints (devices in the network) and changes. When an anomaly or vulnerability is identified, the SOC works according to clear protocols. This stipulates who is involved in which situation, and what actions must be carried out.

Such actions include quarantining data, blocking a suspicious IP address, disabling or isolating devices, deleting files or shutting down processes. Of course, the most urgent reports are the first to receive attention. Where necessary, we do this in consultation with the customer. The goal is to neutralize the safety risk as quickly as possible. In doing so, we keep the interventions as small as possible, so that there is little or no impact on the processes within EZ Factory or your organization.

How does EZ Factory test the security of the platform?

Yearly security check

At least once a year, we have an extensive security audit carried out on both our internal IT infrastructure and the EZ-GO SaaS environments. We let ethical hackers do that. They do a Secure Code Review (an analysis of the source code) and a penetration test, to discover possible weak spots in the software and IT infrastructure. Any findings are discussed and mitigated directly with our IT team.

When major changes happen on the platform, we gace them tested in this way before the change goes live.

The security partner that carries out this audit operates independently of the SOC. The activity of the security partner must be noticed by the SOC as deviant behavior, which is part of the security audit.

How does EZ Factory monitor the security of its own systems?

Ensuring the security of our own office services and IT infrastructure is done by our security partner IP4Sure in collaboration with our operations partner for office automation.
In addition, we have strict protocols for which employees have access to which parts of our own software, the EZ-GO platform and the data on the platform.
The Security Operations Center (SOC) monitors all of EZ Factory’s systems in the same meticulous manner as described above.

How does EZ Factory ensure the security of customer data?

Because the EZ-GO platform is a SaaS solution, EZ Factory also takes care of the storage and security of the data on the platform. The data structure is set up in such a way that it is not possible to have unauthorized access to this data. This is always part of the security audit and has the permanent attention of our Security Operations Center.

What methods do you use for safety tests?

For security reasons, we do not share more details than we display on this page. However, customers can receive more information about our security policy on request.