Download PDF version Contact company

DiffusionData, formerly known as Push Technology, the pioneer and leader in real-time data streaming and messaging solutions announced that it is an ISO 27001:2013 certified provider whose Information Security Management System (ISMS) received third-party accreditation from Certification Europe, an internationally accredited certification body.

ISO 27001 certification

The certification is part of DiffusionData’s extensive work to ensure very high standards of information security for its global customer base.

ISO 27001 certification is an internationally recognised standard for information security management, and achieving this certification requires a rigorous process of assessing and improving an organisation's security practices.

Assessment and evaluation

We believe that when it comes to information security, certifying to an internationally recognised standard provides an edge"

The handling of information securely has been a key priority for DiffusionData since its inception and over the past year the company has intensified its preparations for ISO 27001 certification, dedicating a team to work on meeting all the relevant requirements.

As part of the certification process, DiffusionData’s ISMS was thoroughly evaluated and assessed by a third-party auditor to ensure it met the rigorous requirements of the standard. Neil Seymour, Head of Engineering at DiffusionData, said, “At DiffusionData we believe that when it comes to information security, certifying to an internationally recognised standard provides us with a tangible competitive edge."

Information Security Management System

"Through the expertise of our partner, Ansec, and its experience of the ISO 27001 security framework and principles, we were supported through the development and implementation of an effective Information Security Management System; it was scoped and designed to achieve certification but tailored to meet our specific business needs.”

DiffusionData’s ISMS has been designed and applied to protect the secure development, delivery, maintenance, and support of software and applications, including all managed services associated with the company’s service solutions, while also providing assurances concerning the confidentiality and privacy of corporate and client information.

Download PDF version Download PDF version

In case you missed it

Indonesia immigration boosts security with HID U.ARE.U™ Camera
Indonesia immigration boosts security with HID U.ARE.U™ Camera

Reliable identity verification is an unwavering requirement at mission-critical checkpoints such as border crossings. Oftentimes, however, this involves slow manual processes that...

How are wearable technologies impacting the security market?
How are wearable technologies impacting the security market?

The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and...

The future of home security: how AI integration is rapidly changing security systems for the better
The future of home security: how AI integration is rapidly changing security systems for the better

As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in...

Quick poll
What's the primary benefit of integrating access control with video surveillance?