Two people at an office having a discussion

Visma Trust Centre

Your home base for everything security and privacy at Visma.

View security and privacy information by product, learn more about our standards and protocols, and view documentation.

Security    Privacy

searchicon.png   Product Search

Want to view security information for a specific product?

Get details on data centres, sub-processors that process personal data, and security certifications.

Go to Product Search

Visma has several core security programmes.

Learn how we secure our solutions

Woman working on a computer, smiling
Man working on a computer, kneeling on the floor, leaning his arms on a dining room table

Need a refresher on the basics of cyber security?

Learn about what it is, why it's important, and the most common threats and vulnerabilities.

Get cyber security basics

Schrems II verdict and Cloud Act

Have questions regarding Visma’s use of cloud vendors from the U.S. in light of the Schrems II verdict and Cloud Act, and what this means for your data?

See the measures Visma has taken

Latest on security and privacy from our blog

Man in a brown singlet sitting on a table outside looking at his laptop

What is fake news?

What is fake news and why has fake news become such a large industry? We dig deeper into the different types of fake news and how it can be used to interfere in elections, economies, and geopolitical conflicts.

Man sitting in a sofa looking at his computer

What are data backups and why are they important?

Losing critical data can be devastating for a company. How can you make sure that your organisation’s data is secure, how should you set a solid backup strategy, and what are the advantages and disadvantages of storing your data on cloud servers versus on-premise servers?

""

What is ethical hacking?

Not all hackers are bad—in fact, ethical hackers can help companies strengthen their security measures. But how does bug bounty programs and responsible disclosure programs work, and what does the process of ethical hacking look like?