{"id":10321,"date":"2024-09-25T11:07:12","date_gmt":"2024-09-25T09:07:12","guid":{"rendered":"https:\/\/www.idisglobal.solutions\/?page_id=10321"},"modified":"2024-10-03T12:20:46","modified_gmt":"2024-10-03T10:20:46","slug":"cybersecuritybeleid","status":"publish","type":"page","link":"https:\/\/www.idisglobal.solutions\/en\/supp\/cybersecuritybeleid\/","title":{"rendered":"Cybersecurity Policy"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth hundred-percent-height hundred-percent-height-center-content non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:-100px;--awb-background-color:#0e1f2e;--awb-background-image:url(&quot;https:\/\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/bg_cybersecurity.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-align-content-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:150px;margin-bottom:100px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-text-transform:none;\"><p style=\"text-align: center;\"><strong><span style=\"text-align: center; color: #ffffff; font-size: 60px;\">Cybersecurity<\/span><\/strong><\/p>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"text-align: center; font-weight: 400; --fontsize: 24; line-height: 1.5;\" data-fontsize=\"24\" data-lineheight=\"36px\"><strong><span style=\"color: #ffffff;\">Vulnerability Management<\/span><\/strong><\/h4>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">IDIS takes a thorough and transparent approach to managing and responding to vulnerabilities in our products and services, minimizing potential risks for our customers.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:-65px;--awb-background-color:#ffffff29;--awb-flex-wrap:nowrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-align-content-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 awb-sticky awb-sticky-small awb-sticky-medium awb-sticky-large fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-row fusion-flex-align-items-center fusion-content-nowrap\"><nav class=\"awb-menu awb-menu_row awb-menu_em-hover mobile-mode-collapse-to-button awb-menu_icons-left awb-menu_dc-yes mobile-trigger-fullwidth-off awb-menu_mobile-toggle awb-menu_indent-left mobile-size-full-absolute loading mega-menu-loading awb-menu_desktop awb-menu_dropdown awb-menu_expand-right awb-menu_transition-fade\" style=\"--awb-justify-content:space-between;--awb-items-padding-right:5%;--awb-items-padding-left:5%;--awb-border-color:#00a0af;--awb-border-bottom:4px;--awb-color:#ffffff;--awb-active-color:#ffffff;--awb-main-justify-content:flex-start;--awb-mobile-justify:flex-start;--awb-mobile-caret-left:auto;--awb-mobile-caret-right:0;--awb-fusion-font-family-typography:inherit;--awb-fusion-font-style-typography:normal;--awb-fusion-font-weight-typography:400;--awb-fusion-font-family-submenu-typography:inherit;--awb-fusion-font-style-submenu-typography:normal;--awb-fusion-font-weight-submenu-typography:400;--awb-fusion-font-family-mobile-typography:inherit;--awb-fusion-font-style-mobile-typography:normal;--awb-fusion-font-weight-mobile-typography:400;\" aria-label=\"Cybersecurity menu\" data-breakpoint=\"1024\" data-count=\"1\" data-transition-type=\"bottom-vertical\" data-transition-time=\"300\" data-expand=\"right\"><button type=\"button\" class=\"awb-menu__m-toggle awb-menu__m-toggle_no-text\" aria-expanded=\"false\" aria-controls=\"menu-cybersecurity-menu\"><span class=\"awb-menu__m-toggle-inner\"><span class=\"collapsed-nav-text\"><span class=\"screen-reader-text\">Toggle Navigation<\/span><\/span><span class=\"awb-menu__m-collapse-icon awb-menu__m-collapse-icon_no-text\"><span class=\"awb-menu__m-collapse-icon-open awb-menu__m-collapse-icon-open_no-text fa-bars fas\"><\/span><span class=\"awb-menu__m-collapse-icon-close awb-menu__m-collapse-icon-close_no-text fa-times fas\"><\/span><\/span><\/span><\/button><ul id=\"menu-cybersecurity-menu-1\" class=\"fusion-menu awb-menu__main-ul awb-menu__main-ul_row\"><li   class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-10295 awb-menu__li awb-menu__main-li awb-menu__main-li_regular\"  data-item-id=\"10295\"><span class=\"awb-menu__main-background-default awb-menu__main-background-default_bottom-vertical\"><\/span><span class=\"awb-menu__main-background-active awb-menu__main-background-active_bottom-vertical\"><\/span><a  href=\"https:\/\/www.idisglobal.solutions\/en\/supp\/cybersecurity\/\" class=\"awb-menu__main-a awb-menu__main-a_regular\"><span class=\"menu-text\">IDIS Technology<\/span><\/a><\/li><li   class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-10296 awb-menu__li awb-menu__main-li awb-menu__main-li_regular\"  data-item-id=\"10296\"><span class=\"awb-menu__main-background-default awb-menu__main-background-default_bottom-vertical\"><\/span><span class=\"awb-menu__main-background-active awb-menu__main-background-active_bottom-vertical\"><\/span><a  href=\"https:\/\/www.idisglobal.solutions\/en\/supp\/cybersecuritybeleid\/\" class=\"awb-menu__main-a awb-menu__main-a_regular\"><span class=\"menu-text\">Cybersecurity Policy<\/span><\/a><\/li><li   class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-10297 awb-menu__li awb-menu__main-li awb-menu__main-li_regular\"  data-item-id=\"10297\"><span class=\"awb-menu__main-background-default awb-menu__main-background-default_bottom-vertical\"><\/span><span class=\"awb-menu__main-background-active awb-menu__main-background-active_bottom-vertical\"><\/span><a  href=\"https:\/\/www.idisglobal.solutions\/en\/supp\/kennisgeving-kwetsbaarheid\/\" class=\"awb-menu__main-a awb-menu__main-a_regular\"><span class=\"menu-text\">Vulnerability Notice<\/span><\/a><\/li><\/ul><\/nav><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:100px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-space-evenly fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:90px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:37.5;line-height:1.4;\"><h2 style=\"text-align: center;\">IDIS Vulnerability Management Policy<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p>IDIS adheres to industry best practices in managing and responding to any security vulnerabilities detected in our products. While it is impossible to ensure that our products and services are completely devoid of vulnerabilities &#8211; a reality that is not unique to IDIS but common to all software and services &#8211; we can assure you that we make a sustained effort at every stage of development to identify and address potential vulnerabilities. This approach significantly reduces the risk associated with deploying our products and services in customer environments.<\/p>\n<\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-3 fusion-content-boxes-2 content-boxes-icon-on-side content-left\" style=\"--awb-backgroundcolor:rgba(0,160,175,0.07);--awb-border-radius-top-left:14px;--awb-border-radius-top-right:14px;--awb-border-radius-bottom-right:14px;--awb-border-radius-bottom-left:14px;--awb-title-color:#555555;--awb-margin-top:50px;--awb-margin-bottom:50px;--awb-hover-accent-color:#00a0af;--awb-circle-hover-accent-color:#00a0af;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(0,160,175,0.07);--awb-content-padding-left:154px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/icon_team.png?resize=134%2C134&#038;ssl=1\" width=\"134\" height=\"134\" alt=\"Team\" \/><\/div><h4 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h4_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:154px;\">Response Team<\/h4><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">The IDIS Cybersecurity Team (security@idisglobal.com) is a specialized department committed to identifying and addressing any potential security vulnerabilities within IDIS&#8217;s products. We are dedicated to swift and effective responses in the event of a security vulnerability, which includes comprehensive analysis and the development of countermeasures. Should you encounter any signs of security vulnerability in your product, please do not hesitate to inform us. We assure you that our team is equipped to handle the situation promptly and efficiently.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(0,160,175,0.07);--awb-content-padding-left:154px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/icon_process.png?resize=134%2C134&#038;ssl=1\" width=\"134\" height=\"134\" alt=\"Proces\" \/><\/div><h4 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h4_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:154px;\">Response Process<\/h4><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Upon receipt of a security vulnerability report, we immediately assemble our Security Breach Incident Response Team. This team&#8217;s principal mission is to meticulously dissect the nature and implications of the vulnerability, to devise an effective resolution, and to expediently release the updated, patched firmware on our website with the utmost urgency.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(0,160,175,0.07);--awb-content-padding-left:150px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/icon_policy.png?resize=130%2C130&#038;ssl=1\" width=\"130\" height=\"130\" alt=\"Beleid\" \/><\/div><h4 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h4_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:150px;\">Notice Policy<\/h4><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>The firmware that has been patched for vulnerabilities is uploaded to our website alongside the Vulnerability Report. To prevent zero-day attacks, we withhold the details of the vulnerability (including the nature of the vulnerability, information on affected products and firmware versions, risks, and countermeasures) until the patched firmware is released on our website. In order to deter potential mimicry of attacks, we also avoid disclosing specifics such as attack scenarios related to the vulnerabilities. If the vulnerability impacts multiple products, we ensure the simultaneous release of the respective firmware patches.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:37.5;line-height:1.4;\">IDIS Product Security Long-term Support Policy<\/h2><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/idisglobal-admin.s3.amazonaws.com\/PSTI\/IDIS_Cybersecurity_Support_Period_Policy_v1.0.0_2.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Long-term Support Policy Download<\/span><\/a><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-margin-top:50px;\"><p>IDIS offers long-term support with firmware updates. These can be found on the <a href=\"https:\/\/www.idisglobal.solutions\/downloads\/\">Downloads<\/a> page and are announced in the <a href=\"https:\/\/www.idisglobal.solutions\/nieuws\/\">newsletters<\/a>. Our <a href=\"https:\/\/www.idisglobal.solutions\/technical-bulletin\/\">Technical Bulletin<\/a> provides an overview of all updates in the past quarter, including the Release Notes. While updating surveillance camera firmware is essential for ensuring system security and and that you have the most current version, some organizations may hesitate due to potential impacts on system stability. However, delaying or neglecting firmware upgrades can be harmful, especially given the substantial cybersecurity benefits they provide.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center bottom;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:150px;--awb-margin-bottom:-90px;--awb-background-color:#f9f9f9;--awb-background-size:1100px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:90px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:37.5;line-height:1.4;\"><h2 style=\"text-align: center;\">Report a Vulnerability<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-8\"><p>If you have discovered a new vulnerability in any of our products or services, we encourage you to submit your discovery to <a class=\"securityMail\" href=\"mailto:security@idisglobal.com\" rel=\"noopener noreferrer\">security@idisglobal.com<\/a>. The IDIS Cybersecurity Team will respond to your vulnerability submission within 7 days and aim to assess your report within the same timeframe.<br \/>\nAfter thoroughly reviewing the information you provided, if any vulnerabilities are identified, we will contact you individually with details, and you can also track the progress of your report: <a href=\"https:\/\/www.idisglobal.com\/ticket\">https:\/\/www.idisglobal.com\/ticket<\/a>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":508,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-10321","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Policy bij IDIS<\/title>\n<meta name=\"description\" content=\"(Nederlands) IDIS volgt de beste methodes in de branche bij het beheren en reageren op beveiligingskwetsbaarheden die in onze producten worden gedetecteerd.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Policy bij IDIS\" \/>\n<meta property=\"og:description\" content=\"{:nl}IDIS volgt de beste methodes in de branche bij het beheren en reageren op beveiligingskwetsbaarheden die in onze producten worden gedetecteerd.{:}\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/\" \/>\n<meta property=\"og:site_name\" content=\"IDIS One Solution. One Company.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/idisbenelux\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-03T10:20:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@IDISBenelux\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/cybersecuritybeleid\\\/\",\"url\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/cybersecuritybeleid\\\/\",\"name\":\"Cybersecurity Policy bij IDIS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#website\"},\"datePublished\":\"2024-09-25T09:07:12+00:00\",\"dateModified\":\"2024-10-03T10:20:46+00:00\",\"description\":\"{:nl}IDIS volgt de beste methodes in de branche bij het beheren en reageren op beveiligingskwetsbaarheden die in onze producten worden gedetecteerd.{:}\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/cybersecuritybeleid\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/cybersecuritybeleid\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/cybersecuritybeleid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.idisglobal.solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Support\",\"item\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecuritybeleid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#website\",\"url\":\"https:\\\/\\\/www.idisglobal.solutions\\\/\",\"name\":\"IDIS One Solution. One Company.\",\"description\":\"Leverancier van IP en HD-TVI camera observatiesystemen.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#organization\"},\"alternateName\":\"IDIS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.idisglobal.solutions\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#organization\",\"name\":\"IDIS Synergy BV\",\"alternateName\":\"IDIS\",\"url\":\"https:\\\/\\\/www.idisglobal.solutions\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.idisglobal.solutions\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Favicon180.png?fit=180%2C180&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.idisglobal.solutions\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Favicon180.png?fit=180%2C180&ssl=1\",\"width\":180,\"height\":180,\"caption\":\"IDIS Synergy BV\"},\"image\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/idisbenelux\\\/\",\"https:\\\/\\\/x.com\\\/IDISBenelux\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idis-benelux-bv\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCABTVe9woMH314W4IddXrJQ\",\"https:\\\/\\\/www.instagram.com\\\/idis.bnl\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Policy bij IDIS","description":"(Nederlands) IDIS volgt de beste methodes in de branche bij het beheren en reageren op beveiligingskwetsbaarheden die in onze producten worden gedetecteerd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Policy bij IDIS","og_description":"{:nl}IDIS volgt de beste methodes in de branche bij het beheren en reageren op beveiligingskwetsbaarheden die in onze producten worden gedetecteerd.{:}","og_url":"https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/","og_site_name":"IDIS One Solution. One Company.","article_publisher":"https:\/\/www.facebook.com\/idisbenelux\/","article_modified_time":"2024-10-03T10:20:46+00:00","twitter_card":"summary_large_image","twitter_site":"@IDISBenelux","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/","url":"https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/","name":"Cybersecurity Policy bij IDIS","isPartOf":{"@id":"https:\/\/www.idisglobal.solutions\/#website"},"datePublished":"2024-09-25T09:07:12+00:00","dateModified":"2024-10-03T10:20:46+00:00","description":"{:nl}IDIS volgt de beste methodes in de branche bij het beheren en reageren op beveiligingskwetsbaarheden die in onze producten worden gedetecteerd.{:}","breadcrumb":{"@id":"https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.idisglobal.solutions\/supp\/cybersecuritybeleid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.idisglobal.solutions\/"},{"@type":"ListItem","position":2,"name":"Support","item":"https:\/\/www.idisglobal.solutions\/supp\/"},{"@type":"ListItem","position":3,"name":"Cybersecuritybeleid"}]},{"@type":"WebSite","@id":"https:\/\/www.idisglobal.solutions\/#website","url":"https:\/\/www.idisglobal.solutions\/","name":"IDIS One Solution. One Company.","description":"Leverancier van IP en HD-TVI camera observatiesystemen.","publisher":{"@id":"https:\/\/www.idisglobal.solutions\/#organization"},"alternateName":"IDIS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.idisglobal.solutions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.idisglobal.solutions\/#organization","name":"IDIS Synergy BV","alternateName":"IDIS","url":"https:\/\/www.idisglobal.solutions\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.idisglobal.solutions\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2022\/04\/Favicon180.png?fit=180%2C180&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2022\/04\/Favicon180.png?fit=180%2C180&ssl=1","width":180,"height":180,"caption":"IDIS Synergy BV"},"image":{"@id":"https:\/\/www.idisglobal.solutions\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/idisbenelux\/","https:\/\/x.com\/IDISBenelux","https:\/\/www.linkedin.com\/company\/idis-benelux-bv","https:\/\/www.youtube.com\/channel\/UCABTVe9woMH314W4IddXrJQ","https:\/\/www.instagram.com\/idis.bnl\/"]}]}},"jetpack_shortlink":"https:\/\/wp.me\/Pa8CBw-2Gt","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages\/10321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/comments?post=10321"}],"version-history":[{"count":5,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages\/10321\/revisions"}],"predecessor-version":[{"id":10365,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages\/10321\/revisions\/10365"}],"up":[{"embeddable":true,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages\/508"}],"wp:attachment":[{"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/media?parent=10321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}