Security by Design
Security embedded into the product
OS GIR is created with an emphasis on security and quality. Security should always be a central part when acquiring IT-products. There are several security related vulnerabilities that we focus on in OS GIR: Software, hardware, network systems, social engineering and legislation.
Software - Developed with security
OS GIR is designed to be available whenever you need it. Our development is safeguarded by a series of steps inherent in the development and release management processes – such as automatic pipelines and tests and code reviews. Everything is open source, significantly reducing any insecurities of what happens “behind-the-scenes”.


Hardware - hosting
With the introduction of cloud computing, we now have the possibilities to change and restore applications, and are able to scale faster and target your needs.
Network systems - limits
When applying cloud computing, it is crucial to have control over accesses. Therefore, OS GIR is developed with constraints, and via Site-to-Site VPN technology accesses are granted only to your connected employees and identities.


Social engineering - multiple elements
Onboarding
If you use OS GIR to create new employees, we can automatically and safely create them in the connected IT-systems. Additionally, there is the possibility of creating a built-in approval flow when creating employees, securing transparency of who approves what and when.
Organization changes
With OS GIR, you get a planning tool where changes can be created in advance, where you can inspect, edit and quality check all the details before the change launches. This caters for a smooth and flawless result with regards to organizational changes.
Offboarding
Whenever collaborations expire or are terminated, OS GIR helps with terminating accesses automatically and, if needed, immediately across the IT-landscape.
Legislation


Management supervision

Software - Developed with security

Hardware - Hosting

Social engineering - Multiple elements
Onboarding
If you use OS GIR to create new employees, we can safely create them in the relevant and connected IT-systems. Additionally, there is the possibility of creating a built-in approval flow, securing transparency of who approves what and when.
Organization changes
It is crucial that all elements are in order during an organizational change, without any problems and interruptions causing damage and delays to your organization. With OS GIR, you get a planning tool where changes can be created in advance, where you can inspect, edit and quality check all the details before the change launces.
Offboarding
Whenever collaborations expire or are terminated, OS GIR helps with terminating accesses at the right time across the IT-landscape.

Network systems - Limits
When applying cloud computing, it is crucial to have control of accesses. Therefore, OS GIR is developed with constraints, and via Site-to-Site VPN technology accesses are granted only to your connected employees and identities.

Legislation
