Zum Hauptinhalt springen



Beliebte Suchen

  • Yes, Planview utilizes AES-256 as the encryption algorithm for data at rest and Transport Layer Security (TLS) for data in transit.

  • Absolutely. Planview understands, in many cases, the best defense against cyber-attacks is the person behind the keyboard. As a result, at least annually, a formal security awareness training is held with an assessment at the completion to ensure the content was understood. Additionally, other avenues (blog posts, company messages, etc.) are utilized throughout the year to provide relevant information about recent trends in the information security world.

  • Planview classifies all customer data as sensitive and strives to provide the strictest control over the means to access it. Role-based access is utilized to ensure only those employees with a business need to access customer data have it. Access is reviewed regularly and removed promptly upon an employee’s departure. Access to production environments is granted using multi-factor authentication and logged / monitored by a dedicated security team.

  • Planview believes security by design and default isn’t just a saying. We test it regularly. Vulnerability scans are performed monthly, at a minimum. Additionally, Planview engages with an independent third party to perform rigorous penetration testing on each of its products an annual basis. Identified findings are triaged and scheduled for remediation based on criticality.

  • Detailed test results tend to contain information which would be considered confidential (ex. Hostnames, internal IP addresses, usernames, etc). That being said, Planview can provide executive summaries of its annual penetration tests under a non-disclosure agreement.

Questions? Get in touch with us.

We want to hear from you. Contact Planview’s security team to get the answers.

Email Security Team