Security Organization
Our security organization, YKP Systems Global Security Services, is responsible for setting objectives for information security management to preserve our commitment to our customers. This includes setting policies in the following areas:
Security Policy
The policy establishes YKP Systems direction and support for information security and sets a risk management framework that is in accordance with business requirements and relevant laws and regulations.
To view our information security policy, please contact account team.
Asset management
This area focuses on achieving and maintaining appropriate protection of YKP Systems critical infrastructure required for its service delivery.
Human Resources Security
Controls to ensure that all YKP Systems employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered.
Physical and Environmental Security
To prevent unauthorized physical access, damage, and interference to our organization's premises and information.
Access Control
Framework to ensure only approved users are granted access to appropriate systems and resources.
Information Security Incident Management
Policies and processes aimed at making sure information security events and weaknesses are communicated in a manner allowing timely corrective action.
Security Vulnerability Reporting
Our team gives immediate attention to any report of security issues. about our security disclosure process and how to submit a security vulnerability report.
Compliance and Validation
The compliance and validation phase is an important collection of audit and review activities that provide assurances that our implemented controls are designed and operating effectively and aligned with the policies set by the security organization. Learn more about the compliance certifications that YKP Systems currently maintains.
Security Operations
YKP Systems has invested significant resources to ensure it can detect and respond to security events and incidents that impact its infrastructure. It is key to point out that this function does not involve actively monitoring individual customer solutions, but the overarching networking and physical environment including the monitoring of internal networks and employee access customer environments.
Security operations at YKP Systems ensure that:
- Incidents are responded to in a timely manner and communication is disseminated to the relevant parties
- Corrective actions are identified and executed
- Root cause analyses are performed
- Lessons learned are fed back to the policy and planning functions
This function of our security management system drives continuous improvement of the practices and models we implement to protect YKP Systems infrastructure.
Effective mitigation of security risks of cloud computing requires a combination of secure application architecture and security management disciplines within the service provider. Security Management at YKP Systems involves the coordination of the security organization, security controls, and compliance and security operations.
“Card providers, banks and financial bodies now demand a stringent level of security on all remote transactions and the totally secure storage of transaction data. It was with this in mind that we choose YKP Systems as our partner for the project. We had already gained experience of YKP Systems capabilities from within MNJ SOFTWARE and involvement with other high level projects. Their PCI compliance and Fanatical Support® promise sealed the partnership.”