Your search results for

371 results:
11. Privacy Policy  
URL:
Privacy policy and information on the use of cookies comforte AG takes the protection of your personal data seriously and has implemented the according legal provisions of the General Data…  
12. Partners & Alliances  
URL:
Partner location  
13. Payments Security for ACI Products  
URL:
DATA PROTECTED, NO MATTER WHAT comforte AG: Behind the Scenes of PCI DSS 4.0: Winning the Game Before the Clock Runs Out With the PCI DSS 4.0 compliance deadline fast approaching, organizations are…  
14. Payments Security for ACI Products  
URL:
DATA PROTECTED, NO MATTER WHAT comforte AG: Behind the Scenes of PCI DSS 4.0: Winning the Game Before the Clock Runs Out With the PCI DSS 4.0 compliance deadline fast approaching, organizations are…  
15. Corporate Governance & ESG  
URL:
  CORPORATE GOVERNANCE, ENVIRONMENTAL SOCIAL GOVERNANCE ESG StrategyfalseSustainability and responsible action are guiding principles that define the way comforte AG sees itself. We firmly…  
16. Corporate Governance & ESG  
URL:
Environment We are committed to keeping our ecological footprint as small as possible. To minimize the impact of our business activities on the environment, we aim to operate as climate-neutral as…  
17. Corporate Governance & ESG  
URL:
Social responsibility Strong personal relationships and mutual trust are essential in a digitalized world. Our goal is to build long-term partnerships with our employees and our customers.…  
18. DORA  
URL:
DORA (Digital Operational Resilience Act) is a EU regulation that aims to achieve comprehensive information and communication technology (ICT) risk management in the EU financial sector and…  
19. comforte Data Security Platform  
URL:
Threat actors are still successfully bypassing legacy defenses. One overlooked security hole or vulnerability, and suddenly attackers can find a way through. And don’t forget about inside jobs. Many…  
20. Zero trust can improve your security posture  
URL:
Understanding these facts is the first part of your Zero Trust journey. Border and perimeter security isn’t enough Many enterprises still rely heavily on protecting the borders and perimeters…  
Search results 11 until 20 of 371