LOG IN
Digital signageVideo (EasyMovie)
AUDIENCES
Shoppers
Employees
Flow
Market
resourcesCASTINGABOUTCONTACT
Centre d'aideSupportLegalCybersecuritySite map
LOG IN
Digital signageVideo (EasyMovie)
CONTACT
Latest articles
Qu'est-ce que le Retail Media et pourquoi est-il stratégique ?
Accélérateur de prise de décision dans le parcours d'achat du consommateur, le retail media connaît une forte croissance. Découvrez son fonctionnement et ses enjeux.
Read the article
Point of sale
Qu’est-ce que le flex office ? Définition, fonctionnement et bonnes pratiques
Le flex office transforme l'organisation du travail. Découvrez ses avantages, inconvénients et les meilleures pratiques pour l'adopter en entreprise.
Read the article
Internal communication
Structurer sa communication interne : les 9 étapes essentielles
Découvrez une méthode en 9 étapes pour structurer votre communication interne, renforcer l’engagement et impliquer durablement vos collaborateurs.
Read the article
Communication
Digital out of home - publicité commerciales
Les avantages d’une régie publicitaire DOOH pour maximiser les performances des campagnes
Découvrez comment une régie publicitaire spécialisée DOOH optimise l'affichage dynamique pour maximiser la visibilité et renforcer le rayonnement d’une marque.
Read the article
Digital Signage
Monetize and monetize in-store screens
Digital signage screens are communication spaces with high monetization potential. Find out how to monetize your screens.
Read the article
Digital Signage
Point of sale
L’évolution des moyens de communication à l’ère du digital
L’évolution des moyens de communication s’accélère avec le digital. Découvrez les tendances clés et leurs impacts sur les entreprises.
Read the article
Digital Signage
Comment choisir le moyen de communication adapté à votre entreprise ?
Découvrez comment choisir le bon moyen de communication en entreprise : interne, externe, digital ou traditionnel, et optimisez votre stratégie.
Read the article
Internal communication
Montage vidéo : conseils et outils de création
Découvrez les meilleurs conseils et outils pour le montage vidéo afin de créer des contenus captivants et professionnels facilement.
Read the article
Video
Video tutorials
Comment faire un plan de communication ? 10 étapes
Voici les 10 étapes à suivre pour construire un plan de communication efficace et rapidement actionnable par votre entreprise.
Read the article
Communication
Zero-click content : qu'est ce que c'est, et pourquoi en créer ?
Découvrez comment créer du contenu "zero click" efficace pour attirer et engager votre audience sans qu'ils aient besoin de cliquer pour plus d'informations.
Read the article
Video
See all articles
CONTACT
MENU
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Cenareo is committed to protecting the confidentiality, integrity, and availability of this data throughout its lifecycle.

This Data Protection Policy outlines the technical and organizational controls Cenareo implements to safeguard customers' data entrusted to us.

By implementing these data protection controls and fostering a culture of data security awareness, we strive to provide Cenareo customers with the highest level of assurance for the security and confidentiality of their entrusted data.

This policy will be reviewed and updated periodically to reflect changes in technology, security threats, and regulatory requirements.

‍

Responsibilities

  • Management: Provides resources and support for implementing and maintaining data protection controls.
  • IT Security Team: Owns and manages technical controls, ensuring their effectiveness and regular updates.
  • All Employees: Are responsible for adhering to data security policies and procedures, including data handling practices and reporting suspected security incidents.

‍

Access Controls

  • Multi-Factor Authentication (MFA): Cenareo enforces MFA for all user access to systems containing customer's data. This requires a combination of factors, such as passwords, security tokens, or biometrics, to verify user identity.
  • Least Privilege: User access is granted based on the principle of least privilege, granting only the minimum permissions necessary for users to perform their assigned tasks.
  • Access Logging and Monitoring: All access attempts to customer's data are logged and monitored for suspicious activity.

‍

Wi-Fi Network Access

  • Restricted Access: Our Wi-Fi network is configured with access control mechanisms to restrict unauthorized access. This may involve the use of WPA2 encryption with strong passwords or pre-shared keys.
  • Guest Network: For visitors or devices not requiring access to customers' data, a separate guest network may be offered. This guest network should be logically segregated from the network containing customers' data and have limited access to internal resources.

‍

Device Registration:

  • Authorized Devices: Only authorized devices pre-registered with the IT department can connect to the Wi-Fi network. This allows for monitoring and control over devices accessing the network.
  • Device Security Requirements: Registered devices must meet minimum security requirements, such as having updated operating systems, antivirus software, and firewall protection.

‍

Multi-Factor Authentication (MFA)

  • Mandatory MFA: MFA is mandatory for all devices accessing resources containing customers' data, regardless of whether they are connected to the Wi-Fi network or the wired network. MFA adds an extra layer of security beyond passwords, requiring a secondary verification factor like a security token, one-time passcode, or biometrics.
  • MFA Enrollment: All users authorized to access customers' data must enroll their devices in the MFA system and follow the established procedures for MFA authentication.

‍

Security Protocols

We enforce the use of secure protocols like HTTPS for web browsing, secure file transfer protocols (SFTP) for data transfers over the Wi-Fi network, and SSH (Secure Shell) for remote access. These protocols encrypt data in transit, protecting it from eavesdropping or tampering.

‍

Approved Encryption Protocols:

  • AES (Advanced Encryption Standard): A widely adopted symmetric encryption algorithm considered secure for most applications. It comes in various key lengths (128-bit, 192-bit, 256-bit) with 256-bit being the strongest.
  • RSA (Rivest-Shamir-Adleman): An asymmetric encryption algorithm used for public-key cryptography. It's generally considered secure for key exchange and digital signatures when implemented with proper key lengths (at least 2048 bits).

‍

TLS (Transport Layer Security): The successor to SSL, TLS secures communication between applications over a network. It uses a combination of symmetric and asymmetric encryption to ensure data confidentiality and integrity. Versions 1.2 and 1.3 are considered secure. (Note: Earlier versions of TLS (e.g., 1.0 and 1.1) are deprecated due to vulnerabilities)

  • SSH (Secure Shell): A secure protocol for remote access to computer systems. It uses strong encryption to protect user authentication and data transfer.

‍

Deprecated Encryption Protocols:

  • DES (Data Encryption Standard): An older symmetric encryption algorithm that is no longer considered secure for most applications due to its short key length (56-bit).
  • RC4 (Rivest Cipher 4): A stream cipher that was once widely used but has known weaknesses. Its use is strongly discouraged due to security vulnerabilities.
  • MD5 (Message-Digest Algorithm 5): A cryptographic hash function used for data integrity verification. However, MD5 is no longer considered collision-resistant and should not be used for new security implementations.
  • SHA-1 (Secure Hash Algorithm 1): Another cryptographic hash function with vulnerabilities. While not completely broken, SHA-1 is no longer recommended for new applications and should be replaced with SHA-2 or SHA-3 variants.
  • SSL (Secure Sockets Layer): The predecessor to TLS, SSL has known vulnerabilities and is no longer considered secure.

‍

Prohibited Activities

  • Unauthorized Access: The use of the Wi-Fi network for unauthorized access attempts to customers' data or other restricted resources is strictly prohibited.
  • Malicious Activity: Any activities on the Wi-Fi network that could compromise network security or introduce malware are strictly forbidden. This includes activities like unauthorized file sharing, peer-to-peer applications, or running network scanners.

‍

Network Segmentation:

  • Firewalls: We implement firewalls to segment our network and restrict unauthorized access to resources containing customers' data. Firewalls act as barriers, allowing only authorized traffic based on pre-defined security policies.
  • Demilitarized Zone (DMZ): If applicable, we utilize a DMZ to isolate highly sensitive systems containing customers' data from the public internet. The DMZ acts as a controlled buffer zone, minimizing the attack surface for critical systems.
  • Virtual LANs (VLANs): We may implement VLANs to further segment the network and logically separate traffic flows. This restricts communication between different network segments, enhancing data security.

‍

Intrusion Detection and Prevention Systems (IDS/IPS):Cenareo plans to deploy IDS/IPS systems to monitor network traffic for suspicious activity and potential security threats. These systems can detect and block malicious attempts to access customers' data.

‍

Network Access Control (NAC):

Cenareo plans to implement NAC to enforce security policies on devices attempting to connect to the network. NAC ensures devices meet specific security requirements (e.g., updated operating systems, and antivirus software) before granting network access. This helps prevent compromised devices from accessing customers' data.

‍

Vulnerability Management:

Cenareo maintains a comprehensive vulnerability management program to identify, prioritize, and remediate vulnerabilities in network devices and software. This proactive approach minimizes the risk of attackers exploiting vulnerabilities to gain unauthorized access to customers' data.

‍

Network Monitoring and Logging:

We continuously monitor network activity for suspicious behavior and security incidents. Network logs are collected and analyzed to identify potential threats and investigate unauthorized access attempts.

‍

Data Segregation

  • Client Separation: We implement logical and, where feasible, physical segregation of the customer's data processing environment from other client data. This separation minimizes the risk of unauthorized access or cross-contamination.
  • Production/Non-Production Segregation: We logically segregate production environments where customer data is processed from non-production environments like development or testing. This ensures data integrity and prevents unauthorized access from non-production systems.

‍

Encryption

  • Data Encryption at Rest: All customer's data within our systems is encrypted at rest using industry-standard algorithms.
  • Data Encryption in Transit: We utilize TLS/SSL encryption protocols to secure data transfers containing customer's data over public networks. This protects data from unauthorized interception during transmission.

‍

Key Management

We maintain robust key management procedures and processes, including:

  • Secure key generation and activation.
  • Defined key rotation schedules and expiration policies.
  • Secure storage of encryption keys with restricted access controls.
  • Regular reviews and updates of key management practices.

‍

Data Destruction

Cenareo enforces a standardized process for the secure destruction of old media containing customer's data. This process includes physical destruction or secure overwriting of data to ensure it is uncoverable.

At the end of the contract term, we securely destroy the customer's data per a documented procedure. This may involve secure deletion, overwriting, or physical destruction of media.

‍

Data Loss Prevention

Cenareo is implementing DLP solutions on endpoints, email servers, web proxies, and web services to detect and prevent potential leaks of customer data. DLP solutions scan for sensitive data patterns and enforce policies to restrict unauthorized data exfiltration.

Need to reach us?

Contact our teams if you have any questions on this subject.

Contact us
Cenareo

Politique de protection des données

Text Link
Engage your audiences,
become media.
Audiences
ShoppersEmployeesFlowMarket
SOLUTIONS
Solution Affichage dynamiqueSolution Vidéo
Company
CastingAboutContact us
Resources
BlogInsightsCase studiesVideos
CENAREO 2024, All rights reserved.
Centre d'aideSupportLégalRGPDCybersécuritéPlan du site
Cenareo - digital signage, solution video