Please find all our security process below.
To find more about us, please visit Korint website
Secure authentication
Identity management
Production network access restricted
+15 more
ICT readiness for business continuity
Redundancy of information processing facilities
Continuity and Disaster Recovery plans established
Planning of Changes
Installation of software on operational systems
Assessment and decision on information security events
Response to information security incidents
Collection of evidence
+5 more
bastion