Security and compliance

Certified to the highest global standards, MAVOCO safeguards your IoT data and systems with robust security measures and rigorous compliance across all operations.

Security Enterprises

Scale your company with IoT software you can trust

IoT connectivity over mobile networks powers critical infrastructures—from energy and finance to healthcare and beyond. Any disruption can have serious, even life-threatening consequences.

 

MAVOCO understands the vital role CMPs play in these value chains, and we’re committed to strengthening industry security with our three- layer security approach.

MAVOCO complies with top global security standards

MAVOCO is ISO/IEC 27001:2022 certified across all five business locations. ISO/IEC 27001:2022 outlines the requirements for an information security management system (ISMS).

 

Our ISO compliance demonstrates that MAVOCO uses rigorous controls to safeguard data integrity and confidentiality, ensuring secure, reliable operations for CMP deployments.

CMP security features for end users

Our Security Profile solution provides:

  • Precise control over SMS, data, and voice traffic through customizable whitelist and blacklist rules.
  • Automated actions triggered by Kafka notifications to block services when the Security Profile check detects restrictions.
AdobeStock_721766915

CMP security by design

We implement state of the art security controls throughout software development and deployment. These controls include encryption and key management, application security, and monitoring and logging mechanisms.

 

Reach out to gain access to a full description of our CMP security controls security@mavoco.com

Dark - Check-Shield--Streamline-Streamline-3.0.svg

 Platform & application security:

The CMP consists of a full stack of technologies and modules. Security controls are implemented on all layers from the database to backends, middleware, frontend and APIs. Regular penetration tests and vulnerability scans are performed to proactively identify areas for improvements.

 

Dark - Wifi-Signal-5--Streamline-Streamline-3.0.svg

 Infrastructure & network:

The MAVOCO DevOps team runs an automated CI/CD process that scans for vulnerabilities and ensures the integrity of all software components delivered to customers' data centers. While customers typically manage the CMP infrastructure themselves, MAVOCO shares best practices to enhance their infrastructure and network security.

 

Dark - List-Bullets-1--Streamline-Streamline-3.0.svg

Data & identities: 

The CMP has a dedicated Central Authentication Service (CAS) that manages all identity controls throughout the entire account management process. Native features include SSO and integration with other identity providers, with all activities logged and monitored.

 

Dark - Cog-Approved-1--Streamline-Streamline-3.0.svg

Secure software development:

MAVOCO software development is standardized and closely monitored, with built-in security controls such as static code analysis, vulnerability scanning, and integrity verification. The DevOps team manages vulnerability patching to ensure ongoing security.

 

Dark - Common-File-Award--Streamline-Streamline-3.0.svg

 Incident & business continuity management:

If a security incident is suspected, an incident management process is immediately activated. As a European company, MAVOCO adheres to NIS2 requirements for incident reporting. When needed, business continuity and disaster recovery plans are executed according to predefined protocols.

Stay ahead with unmatched security and compliance

Protect your network, ensure regulatory compliance, and build trust with MAVOCO’s robust CMP tailored for CSPs.

Corporate security at MAVOCO

01

Organizational controls

Our CISO and CTO oversee security governance. By having the ownership on top management level, security is baked into the whole organization. Dedicated security objectives are also included in individual performance targets to reinforce our security focus.

02

People controls

As a software company, our team members are our core asset and the first line of defence. This is why we provide extensive security training and resources to equip them with the knowledge and tools to uphold our security standards.

03

Physical controls

In a world where users are more mobile than ever, we ensure they are secure wherever they work from. This is implemented by various controls as well as awareness trainings, so users understand potential threats, when working remotely.

04

Technological controls

We have implemented various technological controls to protect our customers and ourselves from cyber threats. These controls are fine tuned to our processes and workflows to balance security and productivity, considering our position in the critical infrastructure networks. The technological controls span from identity management to endpoint & mail protection, backups, asset management, etc. All these are in focus of our regular assessments to identify gaps and continuously improve our set-up.

Social and environmental impact at MAVACO

We are actively exploring and integrating green technologies and practices into our software development, data centers, and infrastructure to minimize our carbon footprint.

 

To measure our journey in a scientific approach, we’ve embraced the approach and goals of the SME Climate Hub.

You have questions related to security?

Ensuring robust security in connectivity management is our top priority. Reach out to our team with any questions about security compliance, data protection, or MAVOCO’s secure solutions for connectivity service providers.