Product security

Data Access and Auditing

A full Information Security Policy governs data access and management practices in every area of our company. Our software development life cycle is subject to a formal Change Control Policy. Every change to the system is captured in an auditable, reversible trail.

Review for accuracy, security, and appropriateness of software and system configuration changes is required on every change.

We use a combination of manual and automatic systems to perform these reviews. Changes are prevented by systems when the change control process is not followed.

All-access to our systems is logged and monitored using NTT Data EMEAL corporate SIEM. Access permissions and appropriateness are periodically reviewed.

Profile-Based Access Control

Eva lets you set granular access controls to grant and restrict capabilities based on specific profiles and authorities. For more information, go to the following page:

Self-Serve User Management

Eva offers self-serve user management based on an internal IAM for adding, removing, and managing users. Administrators user can create, update and delete users in their eva environments.

Last updated