Cybersecurity at Thulium
At Thulium, we prioritize the security of both your data and that of your customers. Our advanced security measures and rigorous standards ensure comprehensive protection and security for your business.

SSO
Convenient and more secure login to the system

2FA
Additional security for accessing your account

DDoS Protection & Firewalls
Protecting infrastructure against attacks and unauthorized access

Cloud environment
Ensuring the highest level of protection and availability of your data

GDPR Compliance
Ensuring your data is always compliant with GDPR requirements

Data encryption
Security and confidentiality of transmitted data
At Thulium, we understand how vital your data is—not just to your operations, but to your customers’ trust. That’s why we treat security as a top priority, with unwavering care and commitment every step of the way. While we believe our systems are built to the highest security standards, if you do identify any potential vulnerabilities, we encourage you to report them directly to the Head of IT Security at: adrian.chaber@salesmanago.com
Adrian Chaber
Head of IT Security
Training and Audits
Training
We regularly train our team on the latest cybersecurity threats to continuously enhance their awareness and skills. This way, we collectively ensure the safety of our employees and products, while also protecting our customers' data.
Security audits
We regularly undergo security audits conducted by independent experts. This allows us to continuously verify the effectiveness of our protections, quickly respond to potential risks, and ensure that our solutions meet the highest standards for data and system security.
Information Security is Our Priority
Here is the ISO 27001 certificate that confirms this.
What has been verified?
- Information security policy
- Roles and responsibilities regarding information security
- Human resources security
- Asset management
- Access control
- Cryptography
- Physical and environmental security
- Communication security
- Operational security
- System acquisition, development, and maintenance
- Supplier relationships
- Management of information security incidents
- Information security aspects in business continuity management
- Compliance with applicable laws and regulations
