EPOS Manager
Save time and drive efficiency through remote update deployments and get insights into how to improve workplace productivity.
EPOS Digital Solutions are built for data security and compliance.
EPOS is committed to applying the highest security and compliance standards when it comes to your data. Internal and external processes and third-party audits are all set up to make EPOS a secure and trusted partner.
EPOS protects your data at rest and in transit in your on-premises or cloud deployments. Enterprise-grade security with rigorous controls ensure secure and efficient management of your EPOS devices.
EPOS is GDPR compliant and uses the System and Organization Control (SOC) Type I as a framework for yearly audits. These audits verify the top-level security in data storage as well as internal security policies, processes and employee onboarding and training.
The purpose of the SOC II report is to help you understand the controls established by EPOS to support operations and compliance.
Save time and drive efficiency through remote update deployments and get insights into how to improve workplace productivity.
Update company devices with the latest firmware and personalize audio device settings to ensure flawless operation for end-users.
A simple, scalable, and secure platform for partners and customers to access all EPOS APIs and SDKs
Our products show compliance to different mandatory EU directives by either an EU DOC (self-declaration) or EU type examination certificate.
Contact software support with your concerns about security and vulnerabilities with subject line: vulnerability_report
What You Can Expect
When we receive a report of a possible vulnerability through the EPOS Trust Centre, this is what the sender can expect regarding getting an answer:
Our Procedure
The triage of these reports will be done by our Vigilance Evaluation Board, using our internal Procedure called G-600 Vigilance.
The board has a system of vigilance that evaluate the vulnerabilities reports that come in.
They are scored on two parameters 1) Severity of thread & 2) Likelihood of the vulnerability being used.
For More Information
Please also contact us, if you want to hear more about the way we perform this triage, and how the Vigilance Board operates. This could be in the event of a Request for Proposals etc.