Security at ATOSS

Atoss Software AG relies on a comprehensive security strategy to protect and securely process your data. We work proactively on all aspects of security.

In addition to the R&D security process for the secure development of our software, this includes technical compliance when integrating our software solution into HCM systems and ensuring information security in our cloud operation services.


Sicherheitsprozess

R&D security process

Since the integrity and security of business operations are essential for all companies in all sectors, ATOSS, as a provider of HR business software, is committed to ensuring the highest possible level of security in its products. The most visible proof of our commitment is an established dedicated process for the development of our security application.

Download Whitepaper


Secure cloud operations

Our cloud operation service teams take care of the management of our cloud services. This includes the initial provision, ongoing operation and continuous optimization and performance of the cloud platforms. An Information Security Management System (ISMS) based on the model of the international security standard ISO/IEC 27001, has been established for the technical security of the cloud operation service, which ensures continuous improvements.

Cloud Operations

Compliance

Technical compliance

ATOSS relies on team spirit and an international partner ecosystem with the highest technical security standards, including cloud quality and static security code.


Data residency

We achieve the future security of our ATOSS Cloud Services through scalability, a best-of-breed approach and location independence. The use of European and international data centers of the hyper-scalers and service providers cooperating with us will be further expanded as part of our multi-scaler strategy.

What you should know about data storage and data processing in the ATOSS Cloud Services.

Data Residency