London, UK 27 August 2013 FusionExperience, the innovative business and technology services company, today announced that it has successfully attained the International Organisation for Standardisation Certification – ISO 27001, earning the prestigious accreditation after a series of independent, external assessments.
ISO 27001 certification demands that companies adhere to control disciplines spanning numerous areas, including risk management and security as well as business continuity management and compliance, to prevent and defend against potential data system vulnerabilities. The certification also ensures that the information security controls continue to meet security needs on an on-going basis.
Steve Edkins, CEO of FusionExperience commented, “Our clients are looking for increased assurances over the high volumes of data they are entrusting to us and other partners. We are proud to have achieved this independent certification whilst partnering with industry giants such as Salesforce.com, SAP and Dell. It demonstrates our level of commitment to implementing the tightest security controls, and the emphasis we place on the confidentiality and security of our clients’ data.
“We strive to achieve excellence in all of our operations and the ISO certification lays down a strong marker in our effort to deliver our clients the extra-mile levels of service and assurances they have come to expect from FusionExperience.”
The approved information security management systems apply to the provision of business consulting; design, development and support of customised applications using leading edge and proprietary platforms and tools; marketing to sectors including Financial Services and Telecoms.
ISO 27001 requires that management:
- Systematically examine the organisation's information security risks, taking account of the threats, vulnerabilities, and impacts;
- Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable; and
- Adopt an overarching management process to ensure that the information security controls continue to meet the organisation's information security needs on an on-going basis.