Our commitment to your data and security
Solving the complex challenges of information security is an important aspect of our commitment. Our team dedicate their time to proactively strengthening our defenses against threats and mitigating risks. We’ve built our processes and protocols from best practices to maintain confidentiality and data integrity. We do this for the business, our employees, our customers, partners and end-users.
Your dedicated team
The information security team at Freespace is in place to maintain and continually improve an enterprise information security program that effectively protects high-risk information, system integrity and availability, customer data, and Freespace revenue. Security governance will direct security by design to be part of all Freespace products and services.
The program will meet the unique needs of our business by supporting high velocity and innovation while satisfying our contractual, regulatory, and ethical obligations.
Our core beliefs
Freespace’s strategy extends through the protection of end-users to data assets, intellectual property, brand, and partnerships. All stakeholders who use Freespace systems and assets are beneficiaries of Freespace security controls. Security and business resilience are invested in and treated as a strategic advantage.
End users and other stakeholder interests are at the core of all controls and security priorities. Trust has value, and loss of trust has a considerable cost, so we act decisively and assertively to mitigate risks through security controls
Delivering our commitment
We design in our core beliefs throughout the solution cycle from design to architecture and development to implementation. At each stage, we address four areas of concern:
People and certifications
One of the most important components of our security program is the skilled internal and extended IT security professionals who work to ensure that our digital information is protected. Our security teams have an array of certifications, qualifications, and experience.
Processes and technology
Our processes are built to ensure the highest quality in data protection, risk assessments, project and purchase support. Our technology uses robust tools to provide security issue transparency, anomaly detection, vulnerability management, monitoring, access controls, security and risk management.
Security operation
Our security operations team works in conjunction with our information technology teams for cohesive infrastructure, application development, project management and systems support. Security operations include:
- Security operations center (SOC) that is open 24 hours a day, seven days per week, 365 days of the year.
- Monitoring.
- Ticket Management.
- Cloud security.
Incident response
Freespace has a well-documented and tested incident response program, which includes numerous function-specific run books. Tabletop exercises are performed and are being expanded as the program matures. Incident response processes include incident triage, well-defined roles and responsibilities, a communications plan (including customer notification), formal rules on evidence management and documentation, and defined incident leadership.
Risk management
We track security initiatives and risks in a formal governance risk and compliance (GRC) management tool. We review security risks to ensure risk rankings are accurate and driving the appropriate prioritization and investments. Our risk management processes include:
Vulnerability and threat
We leverage our pool of resources from all our locations to collect and distribute the latest threat intel in a standardized format. This allows everyone to take the same actions simultaneously to mitigate or minimize the risk of the latest threats and vulnerabilities. In addition, our global team has standardized vulnerability assessment tools to identify, monitor, and report threats in our environments. Annual third-party assessments are also conducted on our key applications and infrastructure.
Vendor risk management
All Freespace vendors or third parties that transmit, process, or store sensitive data are regularly reviewed to ensure compliance with proper security and regulatory standards. Those failing to comply are required to address the gap(s) in a time period based on the severity of the risk.
Summary of our commitment
Our employees, customers and end users, investors and partners depend upon the security of our information systems and technology. Our team of experts are from a variety of areas in information security. They work collaboratively to ensure we proactively safeguard against threats. With thorough processes and protocols in place to quickly eliminate them.
Discover more
Get started with Freespace
Whether you are researching workplace technologies or at the stage where you want a formal response, we are here to help. We can digitize your workspaces, increase employee collaboration, deliver meaningful insights and more. Let’s get started.
Download the latest Freespace Index report
Download the latest Freespace Index report, generated by occupancy data from around the world, and get insights into the growing workplace trends within each global region, and benchmarks for your organization to manage the return to the workplace.
Download the report