Source: Wincor Nixdorf
Wincor Nixdorf is one of the first companies in Germany to have been awarded certification for its Information Security Management System by the assessment and certification organization DQS.
This means that the IT services provided by Wincor Nixdorf comply with all the requirements of ISO 27001, the international standard for information security management.
Certification puts Wincor Nixdorf in a solid position when it comes to performing an increasing number of tasks on behalf of its customers within the field of IT services, including the management of relevant processes and technology.
"Data protection and information security are among the most important decision-making criteria for our customers," observed Wincor Nixdorf's Chief Information Officer Kirsten Dorsch. "The award of ISO 27001 certification is a clear signal that information security and data protection have top priority at Wincor Nixdorf and that we are pleased to have our security and performance tested by an objective and neutral organization."
Against a background of increasing global intercommunication and information exchange - and the risks associated with such activities -,there is growing demand for effective solutions that are capable of safeguarding the integrity, confidentiality and security of information. In introducing its Information Security Management System, Wincor Nixdorf has responded to market requirements.
ISO certification also serves as evidence to both customers and business partners that a corresponding process has been established and is being regularly monitored.
Wincor Nixdorf's Information Security Management System meets the entire range of information security requirements relating to the introduction, operation, monitoring and maintenance of systems and processes.
"Atsec information security GmbH was involved in the project right from the beginning. The strategic support we received from their experts was very helpful at every stage of the project," said CIO Dorsch. "The project as a whole provided us with a series of new ideas for the optimization of information security management, which we subsequently implemented."