your secure software partner
Wialon is the ultimate solution for fleet digitalization, tracking millions of vehicles worldwide and serving thousands of businesses daily.
Our team behind Wialon does care about your and your clients’ data protection, recognizing it as more than just a trend or a mandatory requirement. We develop top-notch, secure products by continuously integrating global standards in quality assurance, information security and privacy.
Our processes are organized to guarantee the efficient and timely implementation of best practices related to risk management, change management, resource management, incident management, and more.
Compliance
Gurtam, the developer of Wialon, follows the integrated management system policy, meeting ISO 9001’s quality management system’s and ISO/IEC 27001’s information security management system’s requirements. This proves Gurtam’s dedication to maintaining the highest service quality and safeguarding confidentiality, integrity, and availability of data for all our partners.
Comprehensive security measures
Information security and privacy awareness
Upon employment, all Wialon team members are required to read our information security policies and requirements and comply with them. At least once a year, internal training on information security and privacy is conducted for the whole team. Specialized, in-depth training is also provided for roles with enhanced access to data, such as top management and software development positions.
Access and permissions management
Wialon defined roles and responsibilities with limited access to resources and assets. This ensures that any conflicting roles are segregated to maximize process objectivity and effectiveness. Granting access to the company’s resources and assets is based on “Everything is generally forbidden unless expressly permitted.” We determine access rights based on the least privilege principle, as well as the Need-to-know and Need-to-use approaches.
Ensuring security while working remotely
To enhance security while working remotely, we employ such measures and tools as VPN, personal SSL certificates, anti-virus software, strong passwords, clean desk and clean screen policies, automatic computer locking during inactivity, and adhering to rules for using information responsibly.
Physical security management
In our offices, spaces are segmented into distinct zones based on job duties, and access to these areas is controlled through the use of ID badges. Additionally, access to company equipment is strictly regulated, and protective measures are in place to shield against external impacts on this equipment.
Guaranteeing data privacy
All of the information that you share with Wialon is protected. Information confidentiality is upheld through different technical and organizational measures, coupled with a mandatory requirement for employees and third parties to sign NDAs. We also incorporated GDPR standards into our data practices. To ensure we handle personal information safely and responsibly, we regularly conduct security checks in Wialon, following global standards.
Maintaining continuity of operations
Wialon has a dedicated policy and continuity plan outlining the Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for key ICT services. Asset owners, in line with this plan, have developed disaster recovery plans, which undergo periodic testing and updating as needed. Wialon uses Tier 3 data centers, which play a crucial role in ensuring seamless operations and service provision. Also, at least once a year, a third-party pentest is conducted. Please contact Wialon technical support if you need the pentest confirmation.
Secure software development
Our team applies advanced approaches to software development. We monitor the landscape of various vulnerabilities and undergo security audits by certified third-party firms at least once a year. We prioritize product quality, consistently refine testing processes, and integrate information security and privacy measures at every stage of the product life cycle.
Incident management
The main goal of incident management is to restore normal business operations following emergencies swiftly. To do this, Wialon defined roles, information channels, and procedures for incident classification, response, consequence elimination, and recurrence prevention.
Risk management
We identify risks to assets based on a specific threat presence and its related vulnerability. Following the risk assessment, we devise management strategies and propose mitigation measures for significant risks, which may involve enhancing current processes or introducing new ones in response to identified opportunities.
Logging and monitoring
We use a combination of expert analysis and advanced tools (like Zabbix and status.wialon.com) to monitor events, detect system abnormalities, and prevent threats. Asset owners define the monitoring scope, frequency, and record storage, and they manage logging and alerts to ensure regular monitoring and response.
Useful links
Contact us
Questions about personal data
For any questions regarding the use of your personal data, please contact us at privacy@wialon.com.
Questions about information security
If you have questions related to information security and privacy, you can reach our team at infosec@wialon.com.