Fronius’ high standards for security and quality protect its customers and their data, and also give Fronius a major competitive edge. The digitalisation and networking of data and processes has become essential for industry and businesses as well as in the private sector.
Information about and for users needs to be available at all times and everywhere, but at the same time needs maximum protection from security risks, a challenge it meets in compliance with the strictest security guidelines. This makes information security and data protection top priorities at Fronius, for internal business processes and data processing as well as for its products. A variety of measures are used in its data processing, all state of the art, depending on the protection classification and the associated security risk.
Security by Design from the Start
Safety is a top priority for Fronius and is taken into account during the development process as well as integrated into the complete life cycle of its products. In line with concepts for security by design and security by default, Fronius ensures that its systems are designed from the outset to be as free as possible from security vulnerabilities and are resilient against attacks, offering users maximum peace of mind. To achieve this it employs things like encryption and authentication, ensuring individual security-relevant areas are isolated.
The policy for software development at Fronius includes training in secure coding as well as regular security audits and comprehensive security tests (penetration tests) by renowned and independent providers.
Committed to Responsible Business Practices
To protect both its customers and its company, Fronius has implemented secure procedures and scenarios for action that ensure careful review of existing processes and for the introduction of new software tools or order processing contracts, as well as for the fulfillment of data subject rights.
Level-based access methods ensure that Fronius Solar.web users can only use the applications and access data they are authorised to use. This also applies to its employees at Fronius: only trained and authorised individuals are allowed to access the relevant systems and view the data. In addition, Fronius only work with cooperation partners, such as local software developers, who fully comply with strict security requirements and thus guarantee that all processed data is in equally safe hands with them.
High Safety Standards Officially Certified
How can Fronius best protect its systems from attacks or threats on the Internet? What measures are needed to achieve this? Fronius has its own team of experts who deal with these and many other questions. The aim is to maintain and continuously improve the security of its IT infrastructure as well as that of its products and digital services. The Information Security Management System (ISMS) provides the basis for this and serves as a long-term focus of activities.
The Information Security Management System at Fronius was certified in accordance with the international standard ISO 27001 in late September 2022. This means that the high information security standards in its IT and development processes have been inspected in detail and officially verified by two external ISMS auditors. This distinction confirms the careful attention paid to IT and data security at Fronius and, due to the far-reaching implications, gives the company a major competitive advantage.
The software for its products and solutions, as well as the general information infrastructure at Fronius, is not only securely designed and implemented but is also regularly reviewed and improved, as confirmed by the ISO 27001 certification.
Awareness as a Key Factor
Preparation is essential, so potential solutions and security measures used in the event of an actual cyber attack at Fronius are documented as well as officially audited and certified. Fronius not only complies with the applicable safety standards and norms but is also working proactively to meet additional standards that are not currently required but are expected to become requirements at a later date.
How cybercrime attacks work and how to recognise suspicious links or phishing e-mails is the subject of regularly recurring, mandatory training and campaigns for cybercrime awareness and data protection for all Fronius employees. This enables Fronius to achieve awareness of how to best protect itself from cybercrime in both professional and private settings, because safety always starts with personal behavior.
For more information, visit Fronius
Fronius' high standards for security and quality protect its customers and their data, and also give Fronius a ...
Specifier Source is brought to you by the same company that publishes Home Design, Grand Designs Australia Magazine, Kitchens & Bathrooms Quarterly Magazine, Outdoor Design Source, Build Home, CompleteHome and many more.