Log in to use authoring capabilities
  • Open site menu Sites
  • HCL Technologies homeHCL Technologies home
{}
start portlet menu bar

Web Content Viewer

Display content menu Display portlet menu
end portlet menu bar
  • HCL Logo
  • HCLTech
  • About Us
    • About
    • Overview
    • Leadership
    • HCL Ambassadors
    • Newsroom
    • Analyst Recognitions
    • Trust Center
    • Sponsorships
    • Ferrari
    • ECN
  • Language EN
    • FR
    • EN
    • IT
    • DE
    • PT
    • JP
    • ES
    • CN
HCL Software Logo
  • Digital Transformation  
    • Digital Transformation Overview Technology that aligns people and systems
    • HCL Aftermarket Cloud Service lifecycle management platform
    • HCL Commerce Cloud Enterprise e-commerce for B2C and B2B
    • HCL Connections Enterprise collaboration platform
    • HCL Customer Data Platform Flexible and customizable customer data platform
    • HCL Discover Behavioral insights for customer journeys
    • HCL Domino Rapid application development platform
    • HCL DX The DXP for the moments that matter
    • HCL Marketing Cloud Fueling Precision Marketing At Scale with AI
    • HCL Sametime Enterprise secure video meetings and chat
    • HCL Unica Enterprise marketing automation platform
    • HCL Volt MX Multi-experience low code app dev

    Other Featured Products

    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
    • Home
    • Data
      Data and Analytics
    • AI & Automation
      AI and Automation
    • Enterprise Security
      Enterprise Security
    • Cloud Offering
      Cloud Offering
    • Help & Support
  • Data and Analytics  
    • Data and Analytics Overview Trusted, flexible and easy-to-use platforms
    • HCL Actian Empowers the data-driven enterprise
    • HCL Actian Data Platform Data services suite; flexible deployment
    • HCL DataConnect Low-code integration platform
    • HCL Actian Ingres Legendary transactional RDBMS
    • HCL OneDB Build database-driven enterprise apps
    • HCL Informix High-performance multi-model database
    • HCL Nippon Workforce analytics solution
    • HCL Vector Analytics Database High-performance vectorized columnar analytics database
    • HCL Zen Edge Data Management Embeddable edge data management

    Other Featured Products

    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
    • Home
    • Digital
      Digital Transformation
    • AI & Automation
      AI and Automation
    • Enterprise Security
      Enterprise Security
    • Cloud Offering
      Cloud Offering
    • Help & Support
  • AI and Automation  
    • AI and Automation Overview Humanizing AI to solve real-world problems
    • HCL Automation Orchestration Orchestrate and optimize business automation
    • HCL Automation Orchestrator Suite Accelerate IT and business automation
    • HCL BigFix Secure endpoint management
    • HCL Intelligent Operations AI foundation for the digital enterprise
    • HCL Secure DevOps Automated testing and security scanning

    Other Featured Products

    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
    • Home
    • Digital
      Digital Transformation
    • Data
      Data and Analytics
    • Enterprise Security
      Enterprise Security
    • Cloud Offering
      Cloud Offering
    • Help & Support
  • Enterprise Security  
    • Enterprise Security Overview Security from application to endpoint
    • HCL AppScan Scans for Application Vulnerabilities
    • HCL BigFix Secure endpoint management

    Other Featured Products

    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
    • Home
    • Digital
      Digital Transformation
    • Data
      Data and Analytics
    • AI & Automation
      AI and Automation
    • Cloud Offering
      Cloud Offering
    • Help & Support
  • Cloud  
    • Cloud Offering Overview Comprehensive cloud services-based transformation
    • Business Cloud Unified infrastructure platform
    • Create Cloud ProCode, Low-Code, No-Code
    • Hybrid Data Cloud Common data integration layer
    • Intelligent Automation Cloud Set of all automation assets

    Other Featured Products

    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
    • Home
    • Digital
      Digital Transformation
    • Data
      Data and Analytics
    • AI & Automation
      AI and Automation
    • Enterprise Security
      Enterprise Security
    • Help & Support
  • Products  
    • Alphabetical List
    • Industry Software Solutions
    • Industries
    • AI and Automation
    • HCL Automation Orchestrator
    • HCL Automation Orchestrator Suite
    • HCL BigFix
    • HCL Clara
    • HCL DevOps Code ClearCase
    • HCL DevOps Code RealTime
    • HCL DevOps Deploy
    • HCL DevOps Plan
    • HCL DevOps Model RealTime
    • HCL DevOps Test
    • HCL DevOps Test Embedded
    • HCL DevOps Velocity
    • HCL Hero
    • HCL Intelligent Operations
    • HCL Mainframe Solutions
    • HCL Secure DevOps
    • HCL Workload Automation
    • HCL Z Asset Optimizer
    • HCL Z Data Tools
    • HCL Z Abend Investigator
    • HCL Z and I Emulator
    • Enterprise Security
    • HCL AppScan
    • HCL BigFix
    • Other Featured Products
    • HCL Cloud Native
    • HCL Now
    • HCL SoFy
    • Data and Analytics
    • HCL Actian
    • HCL Actian Data Platform
    • HCL DataConnect
    • HCL Informix
    • HCL Actian Ingres
    • HCL Nippon
    • HCL Vector Analytics
    • HCL OneDB
    • HCL Zen Edge Data Management
    • Cloud Offering
    • Digital Transformation
    • HCL Aftermarket Cloud
    • HCL Commerce Cloud
    • HCL Discover
    • HCL DX
    • HCL Leap
    • HCL Link
    • HCL Marketing Cloud
    • HCL Notes
    • HCL SafeLinx
    • HCL Verse
    • HCL Unica
    • HCL Connections
    • HCL Customer Data Platform
    • HCL Domino
    • HCL Sametime
    • HCL Volt MX
    View All Products forward-arrow
    • Telecom & 5G
    • HCL Augmented Network Automation (SON)Intelligent RAN automation platform
    • HCL iCE.XIntelligent device management
    • HCL NFV Acceleration Network performance accelerator
    • HCL X-Haul Complete modern IP suite
    • HCL SMARTWiFi Intelligent WiFi cloud platform
    • Entreprise Cloud AI
    • HCL IntelliServiceEmpowers the data-driven enterprise
    • HCL IntelliSearchEntreprise cognitive search
    • Digital Manufacturing
    • HCL CAMWorksCAM for machining productivity
    • HCL DFMProCAD integrated Design-for-Manufacturing platform
    • HCL GloviusModern lightweight CAD Viewer
    • Banking and Financial Services Trusted solutions for banking
    • Healthcares Deliver new patient experiences
    • Insurance Improve policyholder experiences
    • Manufacturing Transform traditional manufacturing
    • Retail Meet changing consumer needs
  • Learn & Support  
    • Support
    • Knowledge Base
    • Product Documentation
    • Ask the Community
    • Learn
    • Success Stories
    • Event
    • Blog
    • HCLSoftware U
  • Partners  
    • Partner Ecosystem
    • Partner Locator
    • Partner Connect
    • SYNC
  • Contact us
HCLSoftware Logo
  • Digital Transformation
    • Digital Transformation overviewTechnology that aligns people and systems
    • HCL Aftermarket CloudService lifecycle management platform
    • HCL Commerce Cloud Enterprise e-commerce for B2C and B2B
    • HCL ConnectionsEnterprise collaboration platform
    • HCL Customer Data PlatformFlexible and customizable customer data platform
    • HCL DiscoverBehavioral insights for customer journeys
    • HCL DominoRapid application development platform
    • HCL DXThe DXP for the moments that matter
    • HCL Marketing CloudFueling Precision Marketing At Scale with AI
    • HCL SametimeEnterprise secure video meetings and chat
    • HCL UnicaEnterprise marketing automation platform
    • HCL Volt MXMulti-experience low code app dev
    • Other Featured Products
    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
  • Data and Analytics
    • Data and Analytics OverviewTrusted, flexible and easy-to-use platforms
    • HCL ActianEmpowers the data-driven enterprise
    • HCL Actian Data PlatformData services suite; flexible deployment
    • HCL DataConnectLow-code integration platform
    • HCL Actian Ingreslegendary transactional RDBM
    • HCL OneDBBuild database-driven enterprise apps
    • HCL InformixHigh-performance multi-model database
    • HCL NipponWorkforce analytics solution
    • HCL Vector Analytics DatabaseHigh-performance BI and analytics
    • HCL Zen Edge Data ManagementEmbeddable edge data management
    • Other Featured Products
    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
  • AI and Automation
    • AI and Automation Overview Humanizing AI to solve real-world problems
    • HCL Automation OrchestrationOrchestrate and optimize business automation
    • HCL Automation Orchestrator SuiteAccelerate IT and business automation
    • HCL BigFixSecure endpoint management
    • HCL Intelligent OperationsAI foundation for the digital enterprise
    • HCL Secure DevOpsAutomated testing and security scanning
    • Other Featured Products
    • HCL Now
    • HCL SoFy
    • Cloud Native
  • Enterprise Security
    • Enterprise Security OverviewEnterprise Security
    • HCL AppScanScans for Application Vulnerabilities
    • HCL BigFixSecure endpoint management
    • Other Featured Products
    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
  • Cloud
    • Cloud Offering OverviewComprehensive cloud services-based transformation
    • Business CloudUnified infrastructure platform
    • Create CloudProCode, Low-Code, No-Code
    • Hybrid Data CloudCommon data integration layer
    • Intelligent Automation CloudSet of all automation assets
    • Other Featured Products
    • HCL Now
    • HCL SoFy
    • HCL Cloud Native
  • Products
    • Alphabetical List
      • AI and Automation
      • HCL Automation Orchestration
      • HCL Automation Orchestrator Suite
      • HCL BigFix
      • HCL Clara
      • HCL Intelligent Operations
      • HCL DevOps Deploy
      • HCL DevOps Code ClearCase
      • HCL DevOps Code RealTime
      • HCL DevOps Model RealTime
      • HCL DevOps Plan
      • HCL DevOps Test
      • HCL DevOps Velocity
      • HCL Hero
      • HCL Secure DevOps
      • HCL Launch
      • HCL DevOps Test Embedded
      • HCL Workload Automation
      • HCL Mainframe Solutions
      • HCL Z Asset Optimizer
      • HCL Z Abend Investigator
      • HCL Z and I Emulator
      • Data and Analytics
      • HCL Actian
      • HCL Actian Data Platform
      • HCL DataConnect
      • HCL Actian Ingres
      • HCL Vector Analytics Database
      • HCL OneDB
      • HCL Zen Edge Data Management
      • Digital Transformation
      • HCL Aftermarket Cloud
      • HCL Commerce Cloud
      • HCL Discover
      • HCL DX
      • HCL Marketing Cloud
      • HCL Unica
      • HCL Connections
      • HCL Customer Data Platform
      • HCL Domino
      • HCL Sametime
      • HCL Volt MX
      • Enterprise Security
      • HCL AppScan
      • HCL BigFix
      • Other Featured Products
      • HCL Cloud Native
      • HCL Now
      • HCL SoFy
      • View All Products
    • Industry Software Solutions
      • Telecom & 5G
      • HCL Augmented Network Automation (SON)
      • HCL iCE.X
      • HCL NFV AccelerationNetwork performance accelerator
      • HCL X-HaulComplete modern IP suite
      • HCL SMARTWiFiIntelligent WiFi cloud platform
      • Entreprise Cloud AI
      • HCL IntelliService
      • HCL IntelliSearch
      • Digital Manufacturing
      • HCL CAMWorks
      • HCL DFMPro
      • HCL Glovius
    • Industries
      • Banking and Financial ServicesTrusted solutions for banking
      • HealthcaresDeliver new patient experiences
      • InsuranceImprove policyholder experiences
      • ManufacturingTransform traditional manufacturing
      • RetailMeet changing consumer needs
  • Learn & Support
    • Learn
    • Success Stories
    • Event
    • Blog
    • HCLSoftware U
    • Support
    • Knowledge Base
    • Product Documentation
    • Ask the Community
  • Partners
    • Partner Ecosystem
    • Partner Locator
    • Partner Connect
    • SYNC
  • Contact us
  • About Us
    • About
    • Overview
    • Leadership
    • HCL Ambassadors
    • Newsroom
    • Analyst Recognitions
    • Trust Center
    • Sponsorship
    • Ferrari
    • ECN
  • HCLTech
  • Contact us
  • Language EN
    • FR
    • EN
    • IT
    • DE
    • PT
    • JP
    • ES
    • CN
  • HCL Logo

HCLSoftware
Technical and Organizations Measures (TOMs) – Security

The Technical and Organizational Measures (TOMs) provided below apply to all HCLSoftware product offerings. Evidence of the measures implemented and maintained by HCLSoftware Security may be presented in the form of up-to-date compliance attestations, audit reports or extracts from independent bodies upon request from the customer.


Security Policies

HCLSoftware maintains a robust Information Security Management System (ISMS). Security policies are reviewed annually and amended as HCLSoftware deems necessary to maintain security compliance.

A formal Management Review is held every 6 months to assess and evaluate the effectiveness of technical and organizational measures. This includes tracking metrics related to the Governance, Risk and Compliance of our Information Security Management System.

HCLSoftware employees complete Security and Privacy training annually. HCLSoftware has an identified Information Security Organization structure which oversees all Information Security related processes and activities for HCLSoftware.

  • HCL has defined and documented data privacy policies and processes addressing access to personal data.
  • Mandatory Information Security awareness training is provided.
  • HCL continuously reviews event logs for malicious/abnormal behavior.
  • All confirmed incidents reported are analyzed for root cause and impact. The remedial actions are initiated by the process owners. The key incidents along with their root causes and impact are reported to HCL management.
  • HCLSoftware Data Centers and Support Organization are ISO 27001 certified.


Internal IT and IT Security Governance and Management

A formal Internal Audit program is operated to measure the conformance and governance of our ISMS controls. Metrics from our Internal Audit program are presented at our Management Reviews.


Certification/Assurance of Processes and Products

External and independent audits are organized and managed to meet our business needs with respect to certification/assurance. This includes a full and formal examination of the process and products that are supported by our ISMS.

For more information, see Requesting Certification.


Risk Management

HCLSoftware has defined, documented, and implemented a Risk Management framework based on ISO 27005 to identify risks related to security, privacy and other contractual requirements. All risks are evaluated to determine their impact to the business, and then assessed to determine the correct treatment action.

HCLSoftware assesses and addresses risks and creates action plans to mitigate identified risks. All areas of HCLSoftware have Risk Focal Points to assist in the identification and management of risks. All risks are reviewed as needed, once a year at a minimum.


Incident Management

HCLSoftware maintains an incident response policy and follows documented incident response plans including prompt breach notifications as appropriate, to the relevant authorities, customers, and data subjects when a breach is known or reasonably suspected to impact customer data.

The HCLSoftware Incident Response program follows NIST 800-61 r2 (see diagram below)

HCLSoftware maintains separate flows for the following incidents:

  • Cybersecurity incidents
  • Data incidents (including Privacy team when personal data is impacted)
Communication outside of HCL is handled by the appropriate customer-facing resources.

HCL monitors for security incidents 24x7 and escalates to the appropriate Incident Management Response team when an event is detected. The incident process includes isolation/eradication/retention as required, and a root cause analysis is performed for high/critical incidents. Post-incident activity also includes reviews to improve processes/tools as needed.


Physical & Environmental Security

HCLSoftware maintains the physical security of its facilities and Data Centers, which includes taking precautions against environmental threats and power disruptions.

  • Access to Data Centers is controlled and limited by job role and subject to approval.
  • Access to Data Centers is provided on a need only basis and reviewed periodically.
  • Physical access to offices is controlled by an access control mechanism.
  • Visitor entry is monitored and recorded.
  • All critical areas are CCTV covered and recordings are maintained for at least 30 days.


Data Privacy

HCLSoftware has implemented and will maintain a privacy program that is designed to comply with all privacy regulations applicable to the company and the personal data we hold. We also employ processes to ensure that we handle personal data of our customers in accordance with our legal obligations and our customer contracts. The privacy program includes, among other things, the following:

  1. Data protection impact assessment
  2. Policies and Procedures
  3. Privacy Employee Awareness Training
  4. Customer Contracts
  5. Data Transfer Impact Assessments
  6. Vendor/Third Party Privacy Assessments
  7. Product Privacy by Design
  8. Response to Data Subject Requests
  9. Incident Response
  10. Documenting Compliance with Global Privacy Regulations


Ensuring Limited Data Retention

  • Support only collects personal data that is necessary for the purposes of providing support and related services to our customers. Support does not store customer data for longer than needed and takes all the necessary measures to ensure that personal data is secured and deleted in accordance with the internal policies and applicable laws.
  • The diagnostic data stored in the Customer Data Repository (CuDaR) is deleted from the active repository after case closure and takes up to 60 days for it to be permanently deleted from the backups. The case data stored in ServiceNow is retained for up to 5 years after case closure.

Access to and Erasure of Customer Data

Support has the capability to process Data Subject Requests in accordance with internal policies and applicable laws. Customers have access to their data in the Customer Support Portal and can export their data if required. Additionally, HCL Support can assist with exporting customer data upon customer request.


Pseudonymization / Anonymization

Measures for pseudonymization or anonymization of personal data are implemented to the extent necessary in the Support non-production environments.


Encryption of Personal Data

  • When personal data is transmitted, secure end-to-end encryption of the communication is ensured. All personal data transfers occur over HTTPS/SFTP and use minimum TLS 1.2 protocol. The backend database is encrypted at rest using AES-256 encryption.
  • Data in Transit - TLS (Transport Layer Security) encryption is required for all Internet connections during login and all data shall be encrypted during transmission.
  • Data at Rest - Stored customer data is encrypted. Key Management conforms to industry best practices. Encryption leverages AES 256 standards

Measures of Encryption

  • Encryption Key Management - Cryptographic key management procedures are documented and automated. Products or solutions are deployed to keep the data encryption keys encrypted (e.g., software- based solution, Hardware Security Module (HSM)). This is software-based Encryption, Key Management procedure will be automated. Encryption of data is configured at rest and in transit.
  • Encryption Uses - Confidential information transmission over the public internet always utilizes an encrypted channel. Encryption details are documented if transmission is automated. If manual encryption is required, approved, and dedicated staff is responsible for encrypting / decrypting the data. Confidential information is encrypted while in transit over any network using secure protocols like HTTPS, SSL, SFTP, etc. VPN transmissions are performed over an encrypted channel.

System Configuration

The default configuration will be hardened to our HCLSoftware defined system configuration, including passwords before connecting the device to the network.


Confidentiality, Integrity, Availability and Resilience of Processing Systems and Services

  • Support ensures that appropriate controls are in place to safeguard the confidentiality, integrity, and accessibility of Support systems and customer data.
  • Support has implemented a process for onboarding and offboarding of users to prevent from unauthorized access to data. Support follows documented ISMS incident response policies and has a process to escalate data privacy and security issues.
  • Roles and responsibilities are segmented within the support organization to reduce opportunities for unauthorized or unintentional modification or misuse of data. Support ensures that all Support personnel complete the required security and privacy trainings on an annual basis.
  • Support’s ticket management data centers and cloud-based infrastructure are designed to be highly available with redundant components and multiple network paths to avoid single points of failure. Advanced High Availability (AHA) architecture is the primary means to restore service in the case of a disruption that could impact availability. Full backups are performed on Support’s ticket management system every seven days direct to disk and are retained for 28 days, with differential backups taken every 24 hours.

Ability to Restore Availability and Access to Personal Data

  • Support has a Business Continuity Plan that ensures the availability of support in the event of a physical or technical incident. Support’s BCP guides restoration of operations to a pre-defined level, within a predetermined time frame, following a business disruption.The BCP is annually tested.
  • Database backups are taken with the goal of preventing the loss of personal data in the event of a technical malfunction or human error. Incremental backups are performed on the (Customer Data Repository) CuDaR every 12 hours, with weekly differential backups and monthly backup overwrite. The data backup restores are tested regularly, at least once a year.

Business Continuity & Disaster Recovery Planning

  • Backup procedures are applied to all critical development systems.
  • Backup is done at the storage level and industry standards are followed. Each data center has its own backup infrastructure. Data storage procedures comply with the ISO 27001 standard.
  • Interruptions and outages are communicated to affected customers. Communication includes the following information:
    • Nature of impact
    • Locations / departments / process impacted
    • Extent of impact
    • Location and contact information of the IT helpdesk

Test, Assess and Evaluate the Effectiveness of Technical and Organizational Measures

Our Technical and Organizational measures are assessed through formal audit and an internal testing program. A formal Senior Leadership team Management Review is held every 6 months to assess and evaluate the effectiveness of our Information Security Management Systems and therefore our technical and organizational measures. This includes metrics and measures for Governance, Risk and Compliance of our Information Security Management System.


User Access Management

HCL maintains appropriate controls for requesting, approving, granting, revoking and revalidating user access to systems. Only employees with a business need may access data. Access requests are approved based on an individuals role and user access is reviewed regularly.

Logical access procedures define the request, approval, access provisioning and de-provisioning processes. The logical access procedures restrict user access (local or remote) based on user job function for applications and databases (role/profile based appropriate access) for applications, databases and systems to ensure segregation of duties. The procedures are reviewed, administered, and documented based on on-boarding, resource re-assignment or separation. User access reviews are performed to ensure access is appropriate throughout the year.

  • All HCLSoftware system administrators are authenticated using multi-factor authentication, Tacca’s, VPN, AD for system access through privileged access management.
  • In addition, the use of privileged access management is recorded for audit and forensic analysis.

User Identification and Authorization

Every user has a unique named access control (user id and password) to access their accounts.


Protection of Data During Storage

Every user will have access to their specific data and not to all storage.


Asset Management and controls - Laptops, Desktops, Servers, Networking Equipment and Software Assets

  • All Assets are formally declared, reviewed and managed on an Asset Register.
  • Operating systems patches recommended by the vendor are tested and applied regularly to the desktops, laptops, servers, and networking equipment.
  • Default IDs are changed and disabled. Passwords are changed after initial installation. Manufacturers’ default passwords are not used.
  • If sharing of files/directories from a server to other computers is required, then it has to be enabled in such a way that only users who have need to know is having the access to the share and the principle of least privilege is followed.
  • Systems clocks of all the servers and networking equipment are synchronized, and they are set to the time of the time zone of the location of the server/equipment. Only authorized personnel have the privilege to change or reset system clock time.
  • Administrative accounts are set with strong passwords and privileges are given to only identified persons. Admin access is regularly reviewed.
  • Endpoint Detection and Response (NexGen Antivirus & Malware) software is installed where applicable.
  • Backups are taken and restoration checks are done for identified systems based on agreed upon a request basis.
  • Only company owned & Managed laptops are permitted inside the facility.
  • Every HCL employee requires a unique ‘User ID’ and password to access the IT systems in the enterprise.
  • Every user ID has a password and users are required to set and change their passwords as per HCL password policy.
  • User IDs are created as per defined process and with adequate authorizations.
  • Share service accounts are managed via Privileged Access Management platform.

Wireless Controls

  • How we apply wireless controls:
    • Wireless AP can be accessible only from Network Team jump server with authorized access for Wireless management.
  • How we apply wireless controls:
    • PNP-CORP SSID Authentication – Wireless authentication is allowed through the radius/AD server so it will be allowed only HCLSW valid users to connect SSID
    • HCL-Software Guest Authentication – Wireless authentication is allowed through internal captive portal authentication. We will be creating username & password based on the server now request (Wireless Guest ticket will create two tasks, one is for creating credential and second one is disabling credentials , . The second task will be assigned after the end date of WiFi request ).
    • HCL-TECH-SSID authentication – Wireless authentication is using Pre-shared key and it will be shared to HCL Tech users. Password will be changed every three weeks.
  • How do we replace vendor default settings:
    • HCLSW standard templates are used.

Email Security

  • All emails are scanned for virus or malicious codes at gateway level.
  • Email systems are configured to restrict identity spoofing, spamming, and relaying to protect against the same.

Cloud Security

Cloud assets, and services are hardened with Center for Internet Security (CIS) Benchmarks.

  • Cloud Security Posture Management standards and configurations are monitored in real-time by our 24/7 365 Detection, Analytics and Response Team.
  • Cloud Workload Protection and Endpoint Detection and Response (NexGen Antivirus & Malware) software is installed where applicable.
  • HCLSoftware leverages cloud vendor Web Applications Firewalls (WAF) for protection against DDoS and other external attack vectors.

Security Operations

HCLSoftware maintains a 24/7 365 Detection, Analytics and Response (DART) Team that provides monitoring and response services for deviations from defined standards, malicious and/or abnormal activity and threat modeling.

  • Defined CSIRT Response team.
  • CyberSecurity forensics services.

Other Security Controls

  • Firewalls are configured in such a way that only authorized layer 7 application traffic is allowed.
  • All secured communications at HCL follow the current encryption standard.
  • EDR and DLP is installed on all end user machines.

Use of Sub-processors

  • HCL uses certain third parties in connection with providing its services. These include third parties utilized for cloud hosting and for the provision of support and related services. Sub-processors who may access customer personal data are listed on our Trust Center site here: https://www.hcltechsw.com/resources/data-processing-and-transfers , and customers can subscribe to receive updates to the list of sub-processors.
  • HCLSoftware has executed Data Processing Agreements where appropriate with all sub-processors who may access customer personal data to ensure appropriate safeguards are in place for data protection and secure data transfers.
HCL Software Logo
Contact us

hclsoftware logo transparent
  • Columns group1
    • Digital Transformation
    • Data and Analytics
    • AI & Intelligent Automation
    • Enterprise Security
    • Cloud Offering
  • Products
    • Digital Transformation
      • HCL Aftermarket Cloud
      • HCL Commerce Cloud
      • HCL Connections
      • HCL Customer Data Platform
      • HCL Discover
      • HCL Domino
      • HCL DX
      • HCL Leap
      • HCL Link
      • HCL Marketing Cloud
      • HCL Notes
      • HCL SafeLinx
      • HCL Sametime
      • HCL Unica
      • HCL Verse
      • HCL Volt MX
    • AI and Intelligent Automation
      • HCL Automation Orchestration
      • HCL Automation Power Suite
      • HCL BigFix
      • HCL Clara
      • HCL DevOps Code ClearCase
      • HCL DevOps Code RealTime
      • HCL DevOps Deploy
      • HCL DevOps Model RealTime
      • HCL DevOps Plan
      • HCL DevOps Test
      • HCL DevOps Test Embedded
      • HCL DevOps Velocity
      • HCL Intelligent Operations
      • HCL Hero
      • HCL Secure DevOps
      • HCL Mainframe Solutions
      • HCL Workload Automation
      • HCL Z Asset Optimizer
      • HCL Z Data Tools
      • HCL Z Abend Investigator
      • HCL Z and I Emulator
    • Enterprise Security
      • HCL AppScan
      • HCL BigFix
    • Data and Analytics
      • HCL Actian
      • HCL Actian Data Platform
      • HCL DataConnect
      • HCL Informix
      • HCL Actian Ingres
      • HCL Nippon
      • HCL Vector Analytics
      • HCL OneDB
      • HCL Zen Edge Data Management
    • Cloud Offering
      • HCL Business Cloud
      • HCL Create Cloud
      • HCL Hybrid Data Cloud
      • HCL Intelligent Automation Cloud
    • Other Featured Products
      • HCL Now
      • HCL SoFy
      • HCL Cloud Native
  • Columns group 2
    • Resources
      • Success Story
      • Blog
      • Events
      • Video Gallery
      • TOMs – Security
      • Trends & Insights
    • About Us
      • Overview
      • Leadership
      • HCL Ambassadors
      • Newsroom
      • Analyst Recognitions
      • Trust Center
    • HCLSoftware Customers
      • Ecommerce
      • Submit Idea
      • Support
      • Client Advocacy
      • Master Agreements
      • Master Agreements (Archive)
      • License Agreements
      • Open Source
      • Product Lifecycle
  • Partners
    • Partner Ecosystem
    • Partner Locator
    • Partner Connect
    • SYNC
  • Columns group3
    • Legal
      • Accessibility
      • Blog
      • Compliance
      • Privacy Statement
      • Cookie Statement
      • CCPA-Statement
      • Website Disclaimer
      • Future Products
      • PSIRT
      • Software Disclaimer
      • Terms of Use
      • SOC
      • Government - US Federal

Copyright © 2024 HCL Technologies Limited

  • Contact Us
  • Disclaimer
  • Privacy
  • Accessibility
  • Terms of use

We use cookies on our site. Please read more about them here.

Complementary Content Deferred Modules
  • ${title}${badge}
${loading}
Deferred Modules