Loader

Trust Center: Information Security

Last update: March 30, 2026

Trust Center: Information Security

At Mobileum, protecting customer data and ensuring resilient service delivery are fundamental to how we design, build, and operate our solutions. Security is embedded across our technology platforms, operational processes, and governance structures to support secure, reliable, and scalable service delivery.

Mobileum is an ISO/IEC 27001:2022 certified organization. Our Information Security Management System (ISMS) provides a structured approach to identifying risks and implementing appropriate governance, administrative, physical, and technical controls across the organization. This enables us to consistently protect information assets and maintain a strong and resilient security posture.

The section below outlines the key security practices and controls implemented across Mobileum to protect our systems, employees, and customer data, while supporting regulatory compliance and operational resilience:

Governance, Risk & Compliance

Mobileum maintains a structured information security governance framework supported by formal policies, defined roles and responsibilities, and active management oversight. Information security policies establish the principles and expectations for protecting organizational and customer information, and are reviewed periodically to ensure continued alignment with business, regulatory, and industry requirements.

Clear roles and responsibilities are defined across security, IT, engineering, and operational teams to ensure accountability and effective coordination. Segregation of duties is implemented across critical processes such as system administration, financial operations, and change management to reduce the risk of unauthorized or inappropriate activities.

Security considerations are integrated into change management processes to ensure that new systems and services are designed and implemented with appropriate safeguards from the outset. The organization also maintains processes to identify, monitor, and comply with applicable legal, statutory, regulatory, and contractual requirements.

Supplier and third‑party risks are managed through defined onboarding and assessment processes. Security and data protection requirements are incorporated into contractual agreements, and vendor risks are periodically reviewed based on their criticality.

Data Protection & Information Management

Mobileum implements controls to protect organizational and customer information throughout its lifecycle. Information is classified based on sensitivity and business impact, with defined categories such as Public, Internal, Confidential, and Restricted. Handling requirements are established for each classification level to ensure appropriate protection.

Secure information sharing practices are implemented using encryption, authenticated communication channels, and approved platforms to reduce the risk of data exposure. Asset inventories are maintained to provide visibility into information assets and support effective risk management.

Acceptable use guidelines define how organizational assets such as systems, networks, and data should be used responsibly. Processes are in place to ensure the return of assets during role changes or separation, helping prevent unauthorized access.

Secure handling, transfer, and disposal of storage media and devices are enforced through defined procedures, including data sanitization techniques.

Identity & Access Management

Mobileum manages user identities and access through structured processes designed to ensure secure and controlled access to systems and information. Each user is assigned a unique identity to support accountability and traceability of system activities.

Access is granted based on business requirements and follows the principle of least privilege, ensuring users receive only the access necessary to perform their roles. Access provisioning, modification, and revocation are governed by defined workflows and approval mechanisms.

Access rights are periodically reviewed to ensure continued appropriateness, particularly during role changes. Privileged access is subject to enhanced controls, including restricted assignment, monitoring, and periodic review to reduce risks associated with elevated permissions.

Additional access restrictions are applied to sensitive systems and information to ensure that only authorized individuals can access critical resources.

Infrastructure, Network & Endpoint Security

Mobileum implements layered security controls across its infrastructure, including cloud, on‑premises, and hybrid environments. Secure configuration baselines are established to ensure consistent and hardened system deployments.

Network security controls include segmentation and segregation of environments, access controls, and monitoring of network traffic to detect suspicious activity. Encryption is used to protect data in transit and at rest using industry‑standard protocols and algorithms.

Endpoint devices such as laptops and workstations are secured using technologies including endpoint detection and response (EDR), data loss prevention (DLP), and centralized management tools to enforce configuration standards and monitor security posture.

Secure remote access mechanisms are implemented to enable safe access to corporate systems. Physical and environmental security controls protect facilities and critical infrastructure through access control systems, CCTV monitoring, visitor management, power redundancy, and fire protection systems. Clear desk and clear screen practices are enforced to reduce the risk of information exposure.

Secure Development & Change Management

Security is integrated into the software development lifecycle to ensure that applications and systems are designed, developed, and maintained with appropriate safeguards. Secure engineering principles and coding practices are followed to reduce vulnerabilities.

Development, testing, and production environments are segregated to ensure that changes are properly validated before deployment. Access to source code and development environments is restricted to authorized personnel.

Security testing activities are performed to identify and address vulnerabilities. Periodic penetration testing is also conducted to evaluate application resilience.

Changes to systems, applications, and configurations are managed through structured change management processes. Changes are documented, reviewed, approved, and tested to minimize the risk of unintended disruptions or security weaknesses.

Threat Detection & Vulnerability Management

Mobileum implements logging and monitoring controls across critical systems, applications, and infrastructure to support the detection and investigation of security events. Logs are aggregated and analyzed through centralized monitoring platforms to enable correlation and visibility.

The organization maintains continuous monitoring capabilities through its security operations function, enabling proactive detection and response to potential threats. Threat intelligence sources are leveraged to stay informed about emerging risks and enhance detection capabilities.

Vulnerability management processes are implemented to identify, assess, and remediate security weaknesses. Vulnerabilities are evaluated based on risk and impact, and remediation actions such as patching and configuration updates are applied in a timely manner.

Controls are also implemented to protect systems against malware, phishing and other malicious activities, supported by technical safeguards and user awareness.

Incident Response & Resilience

Mobileum maintains structured incident management processes to identify, report, and respond to security incidents. Defined roles, escalation paths, and response procedures ensure that incidents are handled in a timely and coordinated manner.

Continuous monitoring capabilities support prompt detection and response to security events. The organization also maintains external incident response support to assist with complex or high‑severity incidents.

Business continuity and disaster recovery processes are established to support the availability of critical systems and services. Backup mechanisms are implemented to protect data and enable recovery in the event of disruptions. Periodic testing helps validate the effectiveness of recovery processes.

These measures help ensure operational resilience and minimize the impact of disruptions on business operations and customers.

People Security & Awareness

Mobileum implements personnel security measures to ensure that individuals with access to systems and information meet defined standards of integrity and trustworthiness. Background verification processes are conducted in accordance with applicable regulations.

Employees and relevant third parties are required to adhere to confidentiality obligations through non‑disclosure agreements. These agreements define responsibilities for protecting sensitive information and preventing unauthorized disclosure.

A structured security awareness program is maintained to educate employees on cybersecurity risks, policies, and best practices. Training is provided during onboarding and reinforced through periodic sessions and awareness initiatives.

These measures help promote a strong security culture and reduce risks associated with human factors.