SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Bringing the security industry into focus

Esoteric receives ISO 27001 certification by British Standards Institution

Published on 5 Jan, 2017

The ISMS framework of policies and procedures includes legal, physical, and technical controls involved in information risk management and covers people, processes, and technology
ISO/IEC 27001 is the internationally recognised best practice standard for an ISMS

Esoteric, a counterespionage and electronic sweeping company, announced that after a rigorous evaluation of its information security processes, they have been granted ISO 27001 certification by British Standards Institution (BSI).

Protecting information

The accreditation demonstrates the company’s commitment to information security, both of internal data and that of the clients and partners, who entrust them with their valuable sensitive information.

Compliance with the International Organisation for Standardisation's (ISO) strict requirements highlights a commitment to using best practice, providing the clients and partners reassurance with the handling and protection of their information.

"We place the highest priority on information security, our ISO 27001 certification demonstrates our commitment to continual improvement and confirms our policies and practises comply with the most stringent standards," stated Peter Gregg, Operations & Compliance Manager.

ISMS framework

ISO/IEC 27001 is the internationally recognised best practice standard for an information security management system (ISMS). The ISMS framework of policies and procedures includes legal, physical, and technical controls involved in information risk management and covers people, processes, and technology. For more than 100 years, BSI have led the way in standards. They are among the most respected and reputable management systems certification bodies in the world and are accredited by around 20 local and international bodies.

"We recognise that information is one of a company's most valuable assets, any risk to the integrity of that data can make or break a business, security threats impact a company financially, impede expansion, prevent client attraction, damage assets and above all impact reputation," remarked Emma Shaw, Managing Director. When properly managed, a successful information security policy allows an organisation to operate with confidence—something the Esoteric team lives by and advocates for all its clients.

Download PDF Version

Follow us for latest editorial and commercial opportunities
People mentioned in this article

Emma Shaw
Emma Shaw
Peter Gregg
Peter Gregg


Please rate this article


Related videos
Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition