IT Security

Security as a Core Principle, Not a Checkbox

At Agentoryx, information security is not treated as a compliance exercise but as a foundational element of our product and operating model. Our solutions are designed for organizations that depend on reliable protection of data, systems, and business processes—especially small and mid-sized enterprises as well as regulated environments.

Our security approach aligns with recognized best practices and international standards, including ISO/IEC 27001-oriented controls and European cybersecurity guidance. Security requirements are continuously reviewed and refined to reflect evolving threats, regulatory expectations, and operational realities.

Agentoryx Security

A Holistic Security Approach

Agentoryx follows a comprehensive security model that integrates technology, processes, and people. Confidentiality, integrity, and availability of information guide all architectural and operational decisions.

Security considerations are embedded from the earliest design stages (Security by Design). Data collection and processing are limited to what is strictly necessary for the intended purpose (Privacy by Default and data minimization). Protection of personal data under GDPR principles is an integral part of our overall security posture.


Data Residency and Infrastructure

Unless explicitly agreed otherwise, data is stored and processed exclusively in data centers located within the European Union. We work only with infrastructure and cloud providers that demonstrate a high level of security maturity and relevant certifications.

Processing locations, subprocessors, and data transfers are carefully assessed, contractually governed, and documented within our information security and privacy management framework. Transfers outside the EU or EEA are avoided wherever possible; where unavoidable, appropriate safeguards are applied to ensure an adequate level of protection.


Encryption and Technical Safeguards

Data in transit is protected using modern transport encryption (e.g., TLS with current cipher suites). Where appropriate, data at rest is additionally encrypted.

Credentials, cryptographic keys, and other sensitive secrets are handled separately and protected according to the principle of least privilege. Passwords are never stored in plaintext and are processed exclusively using secure hashing mechanisms with established best practices.


Access Control and Operational Security

Internal processes follow structured access-control models. Role-based permissions ensure that access to sensitive systems and data is restricted to authorized individuals only.

Access rights are managed through defined procedures for provisioning, modification, and revocation—particularly during role changes or employee departures. Technical and organizational measures such as network segmentation, system hardening, secure configuration, patch management, logging, and regular security reviews are standard operational practices.


Incident Response and Business Continuity

Agentoryx maintains a structured incident management process. Security events are identified, assessed, prioritized, and handled according to predefined procedures. Confirmed incidents trigger immediate mitigation actions and thorough post-incident documentation.

If personal data is affected, potential notification obligations to supervisory authorities and affected individuals are assessed without delay and fulfilled in accordance with applicable legal requirements.

Business continuity planning covers scenarios such as system outages, data loss, provider failures, or other critical disruptions. Recovery strategies, responsibilities, and communication paths are clearly defined to ensure service continuity and minimize downtime.


Backups, Monitoring, and Continuous Improvement

Regular backups are performed according to documented retention and recovery policies. Backup data is protected against unauthorized access and, where possible, stored in geographically separated locations. Recovery tests are conducted at appropriate intervals to validate restoration procedures.

Monitoring and logging provide ongoing visibility into system availability and operational anomalies. Detected irregularities are investigated promptly to prevent escalation.

Information security at Agentoryx is an ongoing process. Threat landscapes, regulatory changes, and technological developments are continuously evaluated. Where appropriate, external expertise—such as audits, penetration testing, or specialized reviews—is incorporated.

Employee awareness is an essential component. Regular training covers topics such as phishing, password hygiene, data protection, and incident reporting. Confidentiality obligations and clear internal guidelines support consistent security practices in daily operations.


Frequently Asked Questions (FAQ)

How does Agentoryx ensure data is processed only within the EU?

By default, data is processed exclusively in EU-based data centers operated by vetted providers. Processing outside the EU occurs only by explicit agreement and with appropriate safeguards in place.

What encryption methods are used?

All data transfers are protected using modern TLS encryption. Data at rest may be encrypted depending on system design and use case. Passwords and secrets are stored using secure, industry-standard hashing mechanisms.

What does “Security by Design” mean in practice?

Security requirements are considered during feature planning, not added later. This includes minimal data collection, secure default configurations, clear access controls, and risk-based reviews before release.

How is access to systems managed?

Access follows a strict least-privilege model. Permissions are role-based, reviewed regularly, and adjusted immediately when roles change or access is no longer required.

How are security incidents handled?

Agentoryx follows a defined incident response process. Events are analyzed, prioritized, mitigated, and fully documented. Where legally required, notifications are issued in a timely and compliant manner.

Are disaster recovery and continuity plans in place?

Yes. Critical systems are covered by recovery plans that define responsibilities, communication paths, and restoration procedures to ensure operational continuity.

How often are backups created?

Backups are created regularly based on documented schedules and retention policies. Restoration tests are performed to ensure recoverability within reasonable timeframes.

How do you keep systems patched and up to date?

We operate a structured patch and update management process. Security-relevant updates are prioritized and applied promptly.

Are external security assessments conducted?

Depending on risk and use case, external audits, penetration tests, or security reviews may be performed. Findings feed directly into continuous improvement efforts.

How is monitoring implemented?

Key systems are monitored continuously or at defined intervals. Logging and monitoring help detect anomalies, performance issues, or security-relevant events early.

How are vendors and subprocessors assessed?

Third parties are evaluated for technical and organizational security measures before engagement. Contracts include clear requirements for data protection, incident reporting, and compliance.

How are employees trained on security topics?

Employees receive regular training on security awareness, phishing, password handling, data protection, and incident reporting. New hires complete mandatory onboarding training.

Can Agentoryx support industry-specific security requirements?

Yes. Requirements from internal policies, industry standards, regulatory frameworks, or procurement specifications can be assessed and incorporated where clearly defined.

How are customers informed about security-relevant changes?

Material changes to security controls are documented and made available upon request. Customers are proactively informed if changes affect integrations or data handling.

Does Agentoryx support compliance reviews for US customers?

Agentoryx supports security and privacy assessments commonly required by US enterprises, including documentation reviews, security questionnaires, and structured risk discussions.

Is Agentoryx suitable for regulated or public sector environments?

The platform is designed with traceability, governance, and controlled operation in mind, making it suitable for regulated industries and public sector use cases.


Further Reading and References

Federal Office for Information Security (BSI)
Germany’s central authority for information security. Provides guidelines, standards, security advisories, baseline requirements, and practical recommendations for enterprises and public sector organizations.

BSI – IT-Grundschutz
Official framework for systematic information security management systems (ISMS), particularly relevant for small and mid-sized enterprises, public authorities, and regulated industries.

ENISA – European Union Agency for Cybersecurity
The EU’s cybersecurity agency. Publishes studies, guidelines, threat reports, and strategic recommendations at the European level.

European Commission – Cybersecurity
Official information on EU cybersecurity strategies, including NIS2, the Cyber Resilience Act, and related regulatory frameworks.

CERT-Bund (Federal Computer Emergency Response Team)
Provides current security alerts, vulnerability disclosures, and actionable recommendations for organizations in Germany.

ISO/IEC 27001 – Information Security Management (ISO)
International standard for information security management systems. Relevant for certifications and establishing a professional security posture.


Agentoryx treats security as a living responsibility—designed into the platform, enforced in operations, and continuously refined in practice.