your secure software partner

Wialon is the ultimate solution for fleet digitalization, tracking millions of vehicles worldwide and serving thousands of businesses daily.

Our team behind Wialon does care about your and your clients’ data protection, recognizing it as more than just a trend or a mandatory requirement. We develop top-notch, secure products by continuously integrating global standards in quality assurance, information security and privacy.

Our processes are organized to guarantee the efficient and timely implementation of best practices related to risk management, change management, resource management, incident management, and more.

Security

Compliance

Gurtam, the developer of Wialon, follows the integrated management system policy, meeting ISO 9001’s quality management system’s and ISO/IEC 27001’s information security management system’s requirements. This proves Gurtam’s dedication to maintaining the highest service quality and safeguarding confidentiality, integrity, and availability of data for all our partners.

N Side Certified ISO 27001 for Information Security Management

ISO/IEC 27001:2022

Bw260

ISO 9001:2015

624x507 4

Wialon data centers

Stability is non-negotiable. Wialon is hosted in state-of-the-art Tier 3 data centers to ensure maximum reliability and performance.

With a guaranteed 99.5% uptime, you can be confident that Wialon is providing uninterrupted service to your clients around the clock.

Learn how Wialon powers fleet solutions

Comprehensive security measures

To protect your data, we use an approach that evolved from over two decades of experience and includes preventing security issues, training our team regularly, and quickly solving problems when they arise. All policies mentioned below are available upon request.
Information security and privacy awareness

Upon employment, all Wialon team members are required to read our information security policies and requirements and comply with them. At least once a year, internal training on information security and privacy is conducted for the whole team. Specialized, in-depth training is also provided for roles with enhanced access to data, such as top management and software development positions.

Access and permissions management

Wialon defined roles and responsibilities with limited access to resources and assets. This ensures that any conflicting roles are segregated to maximize process objectivity and effectiveness. Granting access to the company’s resources and assets is based on “Everything is generally forbidden unless expressly permitted.” We determine access rights based on the least privilege principle, as well as the Need-to-know and Need-to-use approaches.

Ensuring security while working remotely

To enhance security while working remotely, we employ such measures and tools as VPN, personal SSL certificates, anti-virus software, strong passwords, clean desk and clean screen policies, automatic computer locking during inactivity, and adhering to rules for using information responsibly.

Physical security management

In our offices, spaces are segmented into distinct zones based on job duties, and access to these areas is controlled through the use of ID badges. Additionally, access to company equipment is strictly regulated, and protective measures are in place to shield against external impacts on this equipment.

Guaranteeing data privacy

All of the information that you share with Wialon is protected. Information confidentiality is upheld through different technical and organizational measures, coupled with a mandatory requirement for employees and third parties to sign NDAs. We also incorporated GDPR standards into our data practices. To ensure we handle personal information safely and responsibly, we regularly conduct security checks in Wialon, following global standards.

Maintaining continuity of operations

Wialon has a dedicated policy and continuity plan outlining the Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for key ICT services. Asset owners, in line with this plan, have developed disaster recovery plans, which undergo periodic testing and updating as needed. Wialon uses Tier 3 data centers, which play a crucial role in ensuring seamless operations and service provision. Also, at least once a year, a third-party pentest is conducted. Please contact Wialon technical support if you need the pentest confirmation.

Secure software development

Our team applies advanced approaches to software development. We monitor the landscape of various vulnerabilities and undergo security audits by certified third-party firms at least once a year. We prioritize product quality, consistently refine testing processes, and integrate information security and privacy measures at every stage of the product life cycle.

Incident management

The main goal of incident management is to restore normal business operations following emergencies swiftly. To do this, Wialon defined roles, information channels, and procedures for incident classification, response, consequence elimination, and recurrence prevention. 

Risk management

We identify risks to assets based on a specific threat presence and its related vulnerability. Following the risk assessment, we devise management strategies and propose mitigation measures for significant risks, which may involve enhancing current processes or introducing new ones in response to identified opportunities.

Logging and monitoring

We use a combination of expert analysis and advanced tools (like Zabbix and status.wialon.com) to monitor events, detect system abnormalities, and prevent threats. Asset owners define the monitoring scope, frequency, and record storage, and they manage logging and alerts to ensure regular monitoring and response.

Contact us

Questions about personal data

For any questions regarding the use of your personal data, please contact us at privacy@wialon.com.

Questions about information security

If you have questions related to information security and privacy, you can reach our team at infosec@wialon.com.

Have questions about Wialon security from your clients? Our Technical Growth team is here to support you.

Report a security vulnerability

Security is an ongoing commitment. If you encounter any security vulnerabilities in Wialon, please don’t hesitate to inform us using this form.

Maximum size: 10mb