Kbrw’s head of security, Tommy Vayron, explained: “Kbrw is ISO 27001-certified and for many prospects and customers, our certification is a box they have to tick as part of their procurement process. It’s true that ISO 27001 certifies the management system, not the technical security measures, and it’s important to have both certification and proof of technical security: we always welcome questions about our security measures from prospects and customers.”
Kbrw itself integrates security into the product’s design, development and features. Critically, senior management is fully committed to a culture of security, ensuring management reviews occur at least quarterly to ensure security measures are effective.
To help ensure the success of the company’s thorough approach to secure design, Kbrw tasks both internal and external testers to try to compromise its products, via both penetration tests and audits.
“I believe that this dedication to security, which is supported right at the very top of the organization, means we are likely among the most advanced of all OMS and supply chain optimization solutions vendors,” says Tommy Vayron. “We encounter no issue in securing support for this approach to development, despite the extra costs.”
“We’re also very proactive in respect of the potential for our solutions – and our customers – to be impacted by supply chain vulnerabilities, which is something that is top of mind for many people now. In fact, thanks to our strong technological choices we have only a limited number of dependencies, and we maintain good oversight of them, so we start from a good position in respect of that.”
New challenges and opportunities in compliance
But ISO 27001 isn’t the only standard in town. While ISO 27001 focuses on management systems, meeting GDPR and other national and international regulations also requires additional, specific, technology features. This could create a whole new challenge.
Instead, Kbrw's choice to manage development of products using a lot of in-house technology allows for better control over security and compliance, reducing the overhead of meeting additional regulations that may be unique to specific markets.
In China, for instance – where Kbrw is in the early stages of operating – we set up a specific technological architecture model that’s seamlessly integrated with our overall technological ecosystem, to meet the requirements of PIPL (the Chinese equivalent of GDPR). This could have been a lot more work, but in reality it only required a simple adaptation of Kbrw’s usual architecture model, which already offers everything needed to meet such requirements.
Insider threats and client security
Kbrw's approach to mitigating against potential insider threats and misused access rights is as thorough as its approach to product development. Its stable, well-established team means that the overhead of vetting and background-checking staff is relatively easily accomplished.
Comprehensive administration capabilities including automatic onboarding and offboarding processes to ensure similar levels of security from the client-side.
Information security at Kbrw: more than certification
“Kbrw’s proactive approach to security is an important part of the brand and we’re very proud that security is a foundational principle,” says Tommy Vayron.
In this article, we’ve highlighted Kbrw's proactive approach to security and its integration into the brand. If the article has raised any questions – old or new – for you about security (in a Kbrw context), please get in touch; we’d love to discuss them with you.