Processing ISO 27001 Certification
We are on the process of achieving ISO 27001 Certification
ISO 27001 provides an international benchmark for implementing, managing, and maintaining information security within a company.
Becoming ISO 27001 certified demonstrates conformity of your Information Security Management System (ISMS) with the documented standards and provides your customers with assurance regarding the security of your system.

Zenov Cyber Security
1. Network Security
- Private Internet Service: Zenov uses dedicated Virtual Private Network (VPN) connections to secure internal traffic and prevent unauthorized access.
- Firewalls: Next-generation firewalls (NGFWs) to monitor and filter incoming/outgoing network traffic.
- Network Segmentation: Isolating different departments (e.g., HR, Finance, Operations) to limit access to data only where necessary.
- Encrypted Wi-Fi: Secure, enterprise-grade Wi-Fi with WPA3 encryption and hidden SSIDs.
2. Endpoint Security (Laptops, Desktops, and Devices)
- Enterprise-Managed Laptops: Devices configured with pre-installed security tools and remote monitoring.
- Antivirus & Microsoft Defender ATP: Detect malware and phishing threats.
Restricted USB Ports: Prevent unauthorized data transfers by disabling or restricting USB access. - Laptops are locked in the office and only taken out of office in case of emergency. Passwords are reset
every 30 days for password protected data.
3. Data Protection & Compliance
- Access Control Policies: Role-based access control (RBAC) limits who can access certain data.
- Multi-Factor Authentication (MFA): Mandatory MFA for all logins.
- Cloud Security & Data Loss Prevention (DLP)
4.Physical Security
- Gated Premises & Visitor Logs: The Premises are gated with security guards and all external visitors must
sign-in before accessing the premises. - Biometric & Key Card Access: Only authorized employees can enter workplace with Fingerprint Access
- Security Cameras (CCTV): Continuous monitoring with footage retention for within the office and in each
room – Internal compliance. - Locked Server Rooms & Dedicated Rooms: All Teams have dedicated rooms and are not allowed to work
in other rooms or cross functionally.
5. Background Check (Hiring)
- NID & Passport: National I.D. & Passport Verified when hiring.
Mandatory - Police Clearance: Police clearance and verification necessary to accept offer letter.
- Reference Check + Documentation Verification: Mentioned references are contacted, home address,
utility bills, and bank details are cross-checked and verified.
6.Ongoing Training
- Cyber Security Training: Cyber Security Training provided to employees twice every year.
- Phishing Training: Phishing training provided to employees twice every year.
- Regular Security Audits: Internal and Third party audits are conducted yearly.