Cybersecurity is a major challenge for any society, especially in tech. Echoline attaches the greatest importance to this and is committed to preventing any loss of data or intrusion into its systems, with the support of the Karnov group.
Karnov Group
Because it belongs to the Karnov group, Echoline complies with the group's instructions on computer security, issued by the CISO (Chief Information Security Officer) and CTO (Chief Technology Officer)
Pentest group and external
The Karnov Group regularly carries out penetration tests in the systems of the group's subsidiaries. In addition and in connection with certain contractual obligations, Echoline has penetration tests carried out by external and certified companies.
Cybersecurity is a major challenge for any society, especially in tech. Echoline attaches the greatest importance to this and is committed to preventing any loss of data or intrusion into its systems, with the support of the Karnov group.
Karnov Group
Because it belongs to the Karnov group, Echoline complies with the group's instructions on computer security, issued by the CISO (Chief Information Security Officer) and CTO (Chief Technology Officer)
Pentest group and external
The Karnov Group regularly carries out penetration tests in the systems of the group's subsidiaries. In addition and in connection with certain contractual obligations, Echoline has penetration tests carried out by external and certified companies.
Remote work
The Karnov group has implemented a VPN solution in order to allow employees working remotely to benefit from a secure connection.
formations
Employees of Echoline and the Karnov group are regularly trained on topics related to computer security and tests (such as phishing campaigns) are carried out by the group in order to make employees aware of phishing and its dangers.
Remote work
The Karnov group has implemented a VPN solution in order to allow employees working remotely to benefit from a secure connection.
formations
Employees of Echoline and the Karnov group are regularly trained on topics related to computer security and tests (such as phishing campaigns) are carried out by the group in order to make employees aware of phishing and its dangers.
Hosting in France & robust architecture
Echoline data is hosted on servers located in France, HDS approved and ISO 27001 certified. The back-ups of these servers are also located in France and allow the system to be restarted quickly in the event of an incident.
Access to source code
The Echoline code is protected on a Gitlab instance accessible only to members of the Echoline technical team via 2-factor authentication (MFA) and a password-protected SSH key.
Hosting in France & robust architecture
Echoline data is hosted on servers located in France, HDS approved and ISO 27001 certified. The back-ups of these servers are also located in France and allow the system to be restarted quickly in the event of an incident.
Access to source code
The Echoline code is protected on a Gitlab instance accessible only to members of the Echoline technical team via 2-factor authentication (MFA) and a password-protected SSH key.
SSL certificate
The connection to the application as well as to the showcase website is done in https (SSL certificate).
Password Management
Echoline employees connect to the back office via strong and secure authentication. Echoline client users define their passwords themselves, which no one can access, not even the developers of Echoline.
SSL certificate
The connection to the application as well as to the showcase website is done in https (SSL certificate).
Password Management
Echoline employees connect to the back office via strong and secure authentication. Echoline client users define their passwords themselves, which no one can access, not even the developers of Echoline.