security.koppla.de
Open in
urlscan Pro
2a09:8280:1:667:634a:5608:6788:3e70
Public Scan
URL:
https://security.koppla.de/
Submission: On July 13 via automatic, source certstream-suspicious — Scanned from DE
Submission: On July 13 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
0 forms found in the DOMText Content
TRUST CENTER Share Subscribe Start your security review View & download sensitive information Ask for information Get Access Search items OVERVIEW INTRODUCTION FROM OUR CTO If you are reading this document, then you are serious about security. So am I. I recognise that koppla has both a legal and moral responsibility to ensure that we comply with data protection legislation and industry standards. Our company value is “do the right thing for the customer” and that means not just ticking boxes to ensure your data is safe, but questioning everything we do with the intent of making it safer. It’s not just the right thing to do; it’s good business sense. We survive by ensuring your data is safe. We thrive by constantly looking for ways to make it even safer. It’s my intent that all common security questions should be answered here. If you have any further questions, please don't hesitate to get in touch with me at lasse.steffen@koppla.de, COMPLIANCE GDPR ISO 27001 TISAX Start your security review View & download sensitive information Ask for information Get Access KOPPLA IS REVIEWED AND TRUSTED BY Max Bögl ZECH Bau Implenia LEONHARD WEISS BAU Instone Real Estate KoWo zu Hause in Erfurt. DOCUMENTS All Public Private Bulk Download Request Access to Private Documents Pentest Report ISO 27001 Data Processing Agreement Acceptable Use Policy Access Control Policy Anti-Malicious Software Policy Asset Management Policy Backup Policy Business Continuity Policy BYOD Policy Data Classification Policy Data Sanitization Policy Data Security Policy Encryption Policy General Incident Response Policy IMS Policy Information Security Policy Internal and External Communication Policy Network Security Policy Other Policies Password Policy Physical Security Risk Management Policy Software Development Lifecycle Third Party Personnel Policy Vulnerability Management Policy RISK PROFILE Data Access LevelInternal Impact LevelModerate Recovery Time Objective24-48 hours View more PRODUCT SECURITY Product Architecture Role-Based Access Control Service-Level Agreement View more REPORTS Network Diagram Pentest Report DATA SECURITY Access Monitoring Backups Enabled Data Erasure View more APP SECURITY Responsible Disclosure Credential Management Software Development Lifecycle View more LEGAL Subprocessors Data Processing Agreement Master Services Agreement View more DATA PRIVACY Cookies Data Breach Notifications Data Privacy Officer View more ACCESS CONTROL Data Access Logging Password Security INFRASTRUCTURE Status Monitoring Amazon Web Services BC/DR View more NETWORK SECURITY IDS/IPS Virtual Private Cloud Wireless Security CORPORATE SECURITY Asset Management Practices Email Protection Employee Training View more POLICIES Acceptable Use Policy Access Control Policy Anti-Malicious Software Policy View more If you need help using this Trust Center, please contact us. Contact Support If you think you may have discovered a vulnerability, please send us a note. Report Issue Powered by