Security

Our corporate information and product security page

Our commitment to you

Here at efficy, we understand how critical it is to keep both your data and ours secure and private — safeguarding not just daily operations, but also the trust you place in us.

As a company that handles valuable data, we take our responsibility seriously and lead by example. We make ongoing investments to embed security into every part of our operations, from how we design and develop our products to how we support our users.  

Security built into every process — by design

A well-defined set of processes and measures helps us deliver reliable solutions and ensures your information is handled responsibly.

We’re committed to staying ahead of potential risks, so you can count on products that prioritise your security and privacy by design. Our solutions are built to uphold the integrity, confidentiality, and availability of your data — every step of the way.  

Our certifications

At efficy, we observe key industry best practices and regulatory frameworks to protect your security and privacy.

We’re proud to be certified under ISO/IEC 27001: 2022 and ISO/IEC 27701, two internationally recognised benchmarks for information security and privacy management. These certifications demonstrate our commitment to following rigorous protocols for protecting information assets and handling personal data responsibly.

In addition, efficy is fully compliant with the GDPR and NIS 2 Directive, underscoring our alignment with the European Union’s stringent cybersecurity and privacy requirements.

We also ensure that our Software Development Life Cycle (SDLC) adheres to established industry standards, including OWASP, CIS and CSA.

 

We believe in the adoption of internationally recognized standards, not just for compliance, but to ensure we have a structured, repeatable, and auditable approach to security and privacy.

We believe in the adoption of internationally recognized standards, not just for compliance, but to ensure we have a structured, repeatable, and auditable approach to security and privacy.

GDPR compliance

Our ISMS and the security mission that drives it

efficy has established a comprehensive Information Security Management System (ISMS).  

This system is both a testament to our commitment to data protection and a strategic, operational framework that integrates risk management, compliance, and continuous improvement.

The overall goal of efficy’s ISMS is to protect, detect, identify, respond to, and recover from threats to the confidentiality, integrity, and availability (CIA) of information, information systems, and products at three layers: physical, personal, and organizational.

Our ISMS are more than just a set of standard policies and best practices — they’re a tailored system of security and privacy controls designed around efficy’s specific operational needs.

Our ISMS are more than just a set of standard policies and best practices — they’re a tailored system of security and privacy controls designed around efficy’s specific operational needs.

We’ve captured this commitment in our efficy Security Mission:

SAFEGUARD EFFICY INFORMATION AND OPERATIONS.

SUPPORT DEVELOPMENT AND OPERATIONS OF SECURE SOFTWARE.

See below a high-level description of the nine main pillar of our ISMS:

 

efficy Security Network

efficy has established a cross-functional security organization led by the Chief Information Security Officer (CISO) and supported by dedicated DevSecOps engineers and representatives from multiple departments across the company.

CISO and DPO

efficy has appointed a dedicated Chief Information Security Officer (CISO) with expertise in cybersecurity, as well as a dedicated Data Privacy Officer (DPO). Both serve as cross-functional advocates for data privacy and information security across the organization.

Dedicated Tools

efficy has made significant investments to deploy and integrate specialised security tools that cover a wide range of areas, including:

Compliance

Identity and Access Management (IAM)

Endpoint Detection and Response (EDR)

Intrusion Detection Systems (IDS)

Static Application Security Testing (SAST)

Vulnerability Management (VM)

And third-party application management.

We also maintain specific cybersecurity insurance coverage as an added layer of risk management.  

Risk Management Process

Our risk management process is a cornerstone of efficy’s security posture. It begins with an annual threat and risk analysis for each product line, enabling us to identify emerging risks and vulnerabilities within the evolving digital landscape. 

This is complemented by regular risk assessments integrated into our project management processes, which allows us to continuously evaluate potential impacts on our systems and services. 

Audit and Management Review

Throughout the year, external audits are conducted by a range of stakeholders, including investors and key customers, providing valuable, multi-faceted insights into our security practices. 

We also perform internal audits, and together, these activities culminate in an annual management review, where we rigorously evaluate results and identify areas for improvement.

Vendor Management

Secure management of third-party suppliers is a key part of our security strategy. This includes regular security audits, robust access controls, and secure integration processes where necessary.

We also continuously monitor our third-party landscape to prevent the use of non-approved parties, supported by ad hoc tools and formal approval processes. 

Awareness and Training

We believe that a strong security culture is fundamental to the success of our ISMS. To this end, we run a multi-tiered awareness program designed to educate and empower our employees at all levels of the organization. 

This program includes general security training for all employees, monthly sessions for our Security Ambassador Network, and specialised, role-specific training for technical roles. 

Identity Governance

efficy places a strong emphasis on identity governance and management. 

Our identity framework enforces strict access controls to ensure that only authorised personnel can access specific systems and data. By applying principles like least privilege access, zero trust, and role-based permissions, we minimise the risk of unauthorised access and data breaches. 

Data Management

efficy employs robust mechanisms to classify, store, and protect information throughout the data management lifecycle. We use automated tools to monitor data flows, detect anomalies, and enforce data protection policies in real-time. 

Additionally, we conduct regular data audits and implement encryption protocols to safeguard sensitive information, ensuring both its integrity and confidentiality. 

To learn more about these practices, visit our Trust Center.
For additional information on privacy compliance, please see our Privacy section.

 

Security for our products

As a European company, efficy is committed to handling customer data within the European Union to ensure compliance with GDPR and to reinforce trust among our customers.

But data residency is just one part of our approach. Below are some highlights of our product-related security measures. 

Data Encryption & Access Tools

All customer data is encrypted both in transit and at rest, using only industry-accepted tools, standards, and best practices for data handling and security.

Data Segregation, PII and Data Deletion

Customer data is logically segregated from all other customers’ data. Additionally, personally identifiable information (PII) is never required to take full advantage of efficy’s product features.

efficy also supports data deletion requests, covering both the data we control and the data we process on behalf of our customers.

Audit Trails

efficy logs and stores every change, action, and event, including the deletion of data, to support easy auditing and root cause analysis.

Resilience & Uptime

efficy's solutions are designed to ensure seamless uptime and support enterprise-scale operations. We maintain a robust Business Continuity Plan (BCP) for each solution, prioritising resilience through strategic planning and ensuring critical operations remain uninterrupted, even during unforeseen disruptions.

OPS Security

Operational security is a cornerstone of efficy’s security strategy. We implement a robust operational security policy across all systems and processes, defining clear guidelines for access control, endpoint security, and network monitoring.

These measures help us maintain operational integrity and swiftly identify and deter malicious activities.

Incident Detection Response

We proactively address potential security incidents through a clear, well-designed Incident Response Plan.

This plan includes predefined workflows for detecting, assessing, and responding to incidents, minimising disruption and enabling rapid recovery. We also conduct regular simulations to continually refine our response capabilities and ensure preparedness.

Secure SDLC

Our Secure Development Lifecycle (SDLC) is at the heart of efficy’s approach to product security.

By following industry standards, such as OWASP, CIS and CSA, we’ve established a comprehensive framework for developing secure solutions.

Our SDLC includes stringent security checks at every phase, from requirements analysis and design to implementation and testing, guaranteeing that vulnerabilities are identified and mitigated early in the development process.

Vulnerability Management

efficy's Vulnerability Management (VM) program is designed to proactively identify, evaluate, and address vulnerabilities across our systems and applications.

Leveraging advanced scanning tools, we continuously monitor for potential weaknesses and address them promptly.

Our regular patching schedules and detailed risk assessments help us prioritise critical fixes and maintain a secure environment against evolving threats.

Penetration Testing (Pentest)

efficy runs an annual penetration testing (pentest) program for each product line, working with external security experts to thoroughly assess and validate the robustness of our systems against potential threats.

These independent evaluations are complemented by other tests conducted by our customers, allowing them to confirm that our solutions meet their specific security requirements.

More details are available in our Trust Center.

Report a vulnerability

We encourage external researchers, partners, and the public to report security vulnerabilities to the efficy security team via [email protected].

For more information about the process, please refer to Responsible Disclosure Policy.

Are you interested to know who helped us to keep efficy and our users safe?

 

Visit our Hall of Fame

 

Need more information?

To learn more about efficy’s security posture and see related documents,
please visit our Trust Center.