ATOSS relies on a comprehensive security strategy to protect and securely process your data. We work proactively on all aspects of security.
In addition to the R&D security process for the secure development of our software, this includes technical compliance when integrating our software solution into HCM systems and ensuring information security in our cloud operation services.
Since the integrity and security of business operations are essential for all companies in all sectors, ATOSS, as a provider of HR business software, is committed to ensuring the highest possible level of security in its products. The most visible proof of our commitment is an established dedicated process for the development of our security application.
Our cloud operation service teams take care of the management of our cloud services. This includes the initial provision, ongoing operation and continuous optimization and performance of the cloud platforms. An Information Security Management System (ISMS) based on the model of the international security standard ISO/IEC 27001, has been established for the technical security of the cloud operation service, which ensures continuous improvements.
As an international software company, ATOSS must comply with high information security requirements. This Code of Supplier Information Security (CoSS) is a necessary component of our information security management to guarantee the highest possible information security for our end customers.
ATOSS relies on team spirit and an international partner ecosystem with the highest technical security standards, including cloud quality and static security code.
We achieve the future security of our ATOSS Cloud Services through scalability, a best-of-breed approach and location independence. The use of European and international data centers of the hyper-scalers and service providers cooperating with us will be further expanded as part of our multi-scaler strategy.
What you should know about data storage and data processing in the ATOSS Cloud Services.