Seguridad

Seguridad en Blue Yonder 

Our Commitment to Security and Trust

At Blue Yonder, protecting customer data and maintaining trust are central to everything we do. We operate with a proactive, risk-based approach to incident response and vulnerability management, ensuring that every security issue is addressed swiftly and thoroughly. As cyber threats continue to evolve in both complexity and frequency, we remain committed to securing customer environments, defending against emerging risks, and enabling seamless recovery in the event of an incident. 

Contact us

For questions related to Blue Yonder security, contact [email protected].

Report a concern

To report a security issue, vulnerability, or suspicious activity, contact [email protected].

Cumplimiento

At Blue Yonder we are committed to protecting your data, which is why our Cybersecurity Program, associated security practices and policies are based on the National Institute of Standards & Technology (NIST), Cybersecurity Framework (CSF) and the International Organization for Standardization (ISO) Standards.

Culture of Security

We encourage a culture of security by design to protect your data. Blue Yonder upon request, facilitates a formal process for providing copies of, or ensuring the deletion of, Customer Data in accordance with legal and regulatory requirements.

Incident Response

We understand that the confidentiality, integrity, and availability of your data is vital to your business, and we take our responsibility to protect your data very seriously. We remain vigilant against cyber threats and unauthorized attempts to access our networks and systems. Should we become aware of any accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to your data transmitted, stored, or otherwise processed by Blue Yonder, we will notify you without undue delay. As part of our standard remediation process, Blue Yonder conducts a thorough investigation and analysis to confirm if and how our customers were affected. Furthermore, we are committed to continuously enhancing our security posture, including strengthening our monitoring and detection capabilities.

Business Continuity and Resilience

In the event of a cyber incident, our disaster recovery strategy includes secure, air-gapped backups stored in separate Azure regions, with backup data designed to be both immutable and indelible. These backups reside in an isolated environment, segmented from the network to ensure a reliable recovery path. We regularly validate and test our recovery processes to maintain readiness. Blue Yonder is committed to fostering open communication and collaboration with our customers, working together to implement solutions that meet your needs and uphold a secure, trusted environment.