Security Controls
Align to leading information security standards and frameworks such as ISO 27001 and NIST
Identification and Authentication
Enterprise security features
Secure Architecture & Features
Enterprise data capabilities
Continuous Monitoring
Cloud Services continuously monitored
Defense-in-depth protection
Multiple layers of security which apply defense-in-depth security strategy to the global infrastructure.
Encryption and data isolation
Strong encryption technologies in data transit and at rest.
Vulnerability testing
Bizagi contracts an independent expert security firm to perform tests on Bizagi Cloud Services.
Workforce Security
Integration with multiple identity providers
Security incident management
Bizagi takes security seriously. We encourage our community to report security vulnerabilities and security incidents to Bizagi.
Copyright © 2002-2020 - Bizagi | Terms of use | Privacy Policy | Sitemap