Security Response SLA
Structured. Transparent. Fast. Your shield against security incidents.
Why a Security Response Process?
Security vulnerabilities in software are unavoidable. What matters is how quickly and systematically they are addressed. ITOMIG is the only iTop partner to offer a formalised, CVSS-based Security Response process.
The 4-Phase Process
- Phase 1: Detection & Assessment — A security vulnerability is identified and evaluated according to the Common Vulnerability Scoring System (CVSS).
- Phase 2: Analysis & Classification — ITOMIG analyses the impact on the iTop+ product line and identifies affected customers.
- Phase 3: Information & Recommendations — Affected customers are proactively informed — with risk assessment and concrete recommendations for action.
- Phase 4: Patch & Verification — A patch is provided, the fix verified and customers supported during implementation.
What Makes This Process Special?
- CVSS-based: Objective, standardised risk assessment — no subjective judgements
- Proactive information: You learn about vulnerabilities before they become a problem
- Automated information flow: Combodo → ITOMIG → Customer — structured and traceable
- Documented: The entire process is documented on GitHub and transparent
- Rare in the market: Structured, CVSS-based Security Response is uncommon in the ITSM sector — ITOMIG is one of the few providers to have formalised and transparently documented this process.
Available in
iTop+ Ready
iTop+ Flex
iTop+ Architect