<img alt="" src="https://secure.norm0care.com/164647.png" style="display:none;">
A stethoscoop that is laying on a computer keyboard

What to expect from your security audit of iWelcome?

We have designed and built iWelcome with the complexity, security requirements, privacy concerns, and flexibility challenges of our enterprise customers in mind.

Compliance with our service agreement, as well as with applicable legislative requirements in information security and data protection (privacy) domains should not only be expected from us - but may also be audited.

This whitepaper will help you:

  • Understand what the process of auditing a supplier like iWelcome can look like;
  • Define the purpose of the audit;
  • Plan, guide and close the audit for a satisfactorily result;
  • Get an overview of the standards that can serve as the basis for the audit agenda.

Download Whitepaper