{"id":17050,"date":"2024-07-26T12:19:00","date_gmt":"2024-07-26T11:19:00","guid":{"rendered":"https:\/\/ezfactory.nl\/?page_id=17050"},"modified":"2024-12-09T16:37:15","modified_gmt":"2024-12-09T15:37:15","slug":"security-of-systems-and-data","status":"publish","type":"page","link":"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/","title":{"rendered":"Security of systems and data"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1721137222428{margin-bottom: 5vh !important;padding-top: 20vh !important;padding-bottom: 5vh !important;background: #1c1f45 url(http:\/\/revolution.fuelthemes.net\/wp-content\/uploads\/2018\/03\/f2140.jpg?id=309) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;align-center&#8221;][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-6 vc_col-md-8&#8243;][vc_custom_heading text=&#8221;How does EZ Factory monitor the security of the EZ-GO platform?&#8221; font_container=&#8221;tag:h1|font_size:30px|text_align:left|color:%23FFFFFF&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;&#8221;][vc_custom_heading text=&#8221;Security of systems and data is EZ Factory&#8217;s top priority. The EZ-GO platform (the SaaS environment) is monitored 24\/7 for deviant behavior. If something abnormal is detected, we investigate and mitigate it immediately. We go to great lengths to achieve this, because security is the most important precondition for our platform.&#8221; font_container=&#8221;tag:p|font_size:18px|text_align:left|color:%23FFFFFF&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;text-center&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;17059&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_empty_space height=&#8221;40px&#8221;][vc_custom_heading text=&#8221;Security Operations Center&#8221; font_container=&#8221;tag:h2|font_size:20px|text_align:left&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]Central to our security policy is the Security Operations Center (SOC). This is a close collaboration between the EZ Factory IT department and our partner IP4Sure.<\/p>\n<p>The SOC is the alarm center for our systems and IT environments. Through so-called next-generation solutions (in which AI plays a role, among other things), the SOC monitors all data flows, endpoints (devices in the network) and changes. When an anomaly or vulnerability is identified, the SOC works according to clear protocols. This stipulates who is involved in which situation, and what actions must be carried out.<\/p>\n<p>Such actions include quarantining data, blocking a suspicious IP address, disabling or isolating devices, deleting files or shutting down processes. Of course, the most urgent reports are the first to receive attention. Where necessary, we do this in consultation with the customer. The goal is to neutralize the safety risk as quickly as possible. In doing so, we keep the interventions as small as possible, so that there is little or no impact on the processes within EZ Factory or your organization.[\/vc_column_text][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1721141821765{padding-top: 60px !important;padding-bottom: 60px !important;background: #727272 url(https:\/\/ezfactory.nl\/wp-content\/uploads\/2024\/07\/server.jpg?id=17085) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;repeat-bg&#8221;][vc_column][vc_custom_heading text=&#8221;How does EZ Factory test the security of the platform?&#8221; font_container=&#8221;tag:h1|font_size:30px|text_align:center|color:%23ffffff&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1721992862286{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1721991931979{padding-top: 50px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_empty_space height=&#8221;40px&#8221;][vc_custom_heading text=&#8221;Yearly security check&#8221; font_container=&#8221;tag:h2|font_size:20px|text_align:left&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]At least once a year, we have an extensive security audit carried out on both our internal IT infrastructure and the EZ-GO SaaS environments. We let ethical hackers do that. They do a Secure Code Review (an analysis of the source code) and a penetration test, to discover possible weak spots in the software and IT infrastructure. Any findings are discussed and mitigated directly with our IT team.<\/p>\n<p>When major changes happen on the platform, we gace them tested in this way before the change goes live.<\/p>\n<p>The security partner that carries out this audit operates independently of the SOC. The activity of the security partner must be noticed by the SOC as deviant behavior, which is part of the security audit.[\/vc_column_text][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; css=&#8221;.vc_custom_1721992371910{padding-top: 3vh !important;padding-bottom: 3vh !important;background-color: #f2f2f2 !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1589979857686{padding-right: 5% !important;}&#8221;][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;42px&#8221;][vc_custom_heading text=&#8221;How does EZ Factory monitor the security of its own systems?&#8221; font_container=&#8221;tag:h2|font_size:20px|text_align:left&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;&#8221;][vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;25px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Ensuring the security of our own office services and IT infrastructure is done by our security partner IP4Sure in collaboration with our operations partner for office automation.<br \/>\nIn addition, we have strict protocols for which employees have access to which parts of our own software, the EZ-GO platform and the data on the platform.<br \/>\nThe Security Operations Center (SOC) monitors all of EZ Factory&#8217;s systems in the same meticulous manner as described above.[\/vc_column_text][vc_row_inner thb_max_width=&#8221;&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;42px&#8221;][vc_custom_heading text=&#8221;How does EZ Factory ensure the security of customer data?&#8221; font_container=&#8221;tag:h2|font_size:20px|text_align:left&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Because the EZ-GO platform is a SaaS solution, EZ Factory also takes care of the storage and security of the data on the platform. The data structure is set up in such a way that it is not possible to have unauthorized access to this data. This is always part of the security audit and has the permanent attention of our Security Operations Center.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;42px&#8221;][vc_custom_heading text=&#8221;What methods do you use for safety tests?&#8221; font_container=&#8221;tag:h2|font_size:20px|text_align:left&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]For security reasons, we do not share more details than we display on this page. However, customers can receive more information about our security policy on request.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;17122&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1721137222428{margin-bottom: 5vh !important;padding-top: 20vh !important;padding-bottom: 5vh !important;background: #1c1f45 url(http:\/\/revolution.fuelthemes.net\/wp-content\/uploads\/2018\/03\/f2140.jpg?id=309) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;align-center&#8221;][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-6 vc_col-md-8&#8243;][vc_custom_heading text=&#8221;How does EZ Factory monitor the security of the EZ-GO platform?&#8221; font_container=&#8221;tag:h1|font_size:30px|text_align:left|color:%23FFFFFF&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;&#8221;][vc_custom_heading text=&#8221;Security of systems and data is EZ Factory&#8217;s top priority. The EZ-GO platform (the SaaS&hellip;<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-17050","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security of systems and data<\/title>\n<meta name=\"description\" content=\"Security of systems and data is EZ Factory&#039;s top priority. The EZ-GO platform (the SaaS environment) is monitored 24\/7 for deviant behavior.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security of systems and data\" \/>\n<meta property=\"og:description\" content=\"Security of systems and data is EZ Factory&#039;s top priority. The EZ-GO platform (the SaaS environment) is monitored 24\/7 for deviant behavior.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/\" \/>\n<meta property=\"og:site_name\" content=\"EZ Factory\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EZFactory\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-09T15:37:15+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ezfactorynl\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/security-of-systems-and-data\\\/\",\"url\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/security-of-systems-and-data\\\/\",\"name\":\"Security of systems and data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/#website\"},\"datePublished\":\"2024-07-26T11:19:00+00:00\",\"dateModified\":\"2024-12-09T15:37:15+00:00\",\"description\":\"Security of systems and data is EZ Factory's top priority. The EZ-GO platform (the SaaS environment) is monitored 24\\\/7 for deviant behavior.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/security-of-systems-and-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ezfactory.nl\\\/en\\\/security-of-systems-and-data\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/security-of-systems-and-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security of systems and data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/\",\"name\":\"Easy Factory\",\"description\":\"Digital checklists, tasks, audits &amp; work instructions\",\"publisher\":{\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/#organization\",\"name\":\"EZ Factory\",\"url\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ezfactory.nl\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/logo.png?fit=576%2C190&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ezfactory.nl\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/logo.png?fit=576%2C190&ssl=1\",\"width\":576,\"height\":190,\"caption\":\"EZ Factory\"},\"image\":{\"@id\":\"https:\\\/\\\/ezfactory.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EZFactory\\\/\",\"https:\\\/\\\/x.com\\\/ezfactorynl\",\"https:\\\/\\\/www.instagram.com\\\/ezfactorynl\\\/\",\"https:\\\/\\\/nl.linkedin.com\\\/company\\\/ez-factory\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCaEhfWjdc6tuDn4HzYTF1zQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security of systems and data","description":"Security of systems and data is EZ Factory's top priority. The EZ-GO platform (the SaaS environment) is monitored 24\/7 for deviant behavior.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/","og_locale":"en_US","og_type":"article","og_title":"Security of systems and data","og_description":"Security of systems and data is EZ Factory's top priority. The EZ-GO platform (the SaaS environment) is monitored 24\/7 for deviant behavior.","og_url":"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/","og_site_name":"EZ Factory","article_publisher":"https:\/\/www.facebook.com\/EZFactory\/","article_modified_time":"2024-12-09T15:37:15+00:00","twitter_card":"summary_large_image","twitter_site":"@ezfactorynl","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/","url":"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/","name":"Security of systems and data","isPartOf":{"@id":"https:\/\/ezfactory.nl\/en\/#website"},"datePublished":"2024-07-26T11:19:00+00:00","dateModified":"2024-12-09T15:37:15+00:00","description":"Security of systems and data is EZ Factory's top priority. The EZ-GO platform (the SaaS environment) is monitored 24\/7 for deviant behavior.","breadcrumb":{"@id":"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ezfactory.nl\/en\/security-of-systems-and-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ezfactory.nl\/en\/"},{"@type":"ListItem","position":2,"name":"Security of systems and data"}]},{"@type":"WebSite","@id":"https:\/\/ezfactory.nl\/en\/#website","url":"https:\/\/ezfactory.nl\/en\/","name":"Easy Factory","description":"Digital checklists, tasks, audits &amp; work instructions","publisher":{"@id":"https:\/\/ezfactory.nl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ezfactory.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ezfactory.nl\/en\/#organization","name":"EZ Factory","url":"https:\/\/ezfactory.nl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ezfactory.nl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/ezfactory.nl\/wp-content\/uploads\/2019\/02\/logo.png?fit=576%2C190&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ezfactory.nl\/wp-content\/uploads\/2019\/02\/logo.png?fit=576%2C190&ssl=1","width":576,"height":190,"caption":"EZ Factory"},"image":{"@id":"https:\/\/ezfactory.nl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EZFactory\/","https:\/\/x.com\/ezfactorynl","https:\/\/www.instagram.com\/ezfactorynl\/","https:\/\/nl.linkedin.com\/company\/ez-factory","https:\/\/www.youtube.com\/channel\/UCaEhfWjdc6tuDn4HzYTF1zQ"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ezfactory.nl\/en\/wp-json\/wp\/v2\/pages\/17050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ezfactory.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ezfactory.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ezfactory.nl\/en\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/ezfactory.nl\/en\/wp-json\/wp\/v2\/comments?post=17050"}],"version-history":[{"count":10,"href":"https:\/\/ezfactory.nl\/en\/wp-json\/wp\/v2\/pages\/17050\/revisions"}],"predecessor-version":[{"id":19089,"href":"https:\/\/ezfactory.nl\/en\/wp-json\/wp\/v2\/pages\/17050\/revisions\/19089"}],"wp:attachment":[{"href":"https:\/\/ezfactory.nl\/en\/wp-json\/wp\/v2\/media?parent=17050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}