After the initial certification in 2020, Interflex Datensysteme GmbH has successfully confirmed its information security standards in a repeat audit. TÜV Rheinland issued the internationally recognized certificate according to DIN ISO 27001.
The certificate is valid until the next recertification in March 2026. It covers the main processes in sales, IT, human resources, services, and development. For the first time, not only the locations in Germany but also those in Austria, Switzerland, the Netherlands, and Belgium have been successfully certified. This means that the ISO 27001 certificate now applies to all 18 locations.
“With the successful recertification, we were able to once again demonstrate that we meet the high standards of information security,” said Managing Director Bernhard Sommer. “The certificate is highly relevant to us as a provider of security solutions. We maintain partnerships spanning decades with companies that mostly belong to critical infrastructures. Therefore, I am pleased that we could once again confirm their trust and their high demands on our security standards.”
The international standard DIN ISO 27001 defines requirements for information security management systems (ISMS) in companies and organizations. The certificate is becoming increasingly important for many companies, especially in light of the growing threats from cyberattacks or potential stricter regulations under the upcoming new KRITIS umbrella law. It also represents a key security criterion in supplier structures for companies in industries such as automotive, banking, and insurance, as well as for energy supply companies.
With ISO 27001, it is documented that legal requirements are met and risks within the company are identified and mitigated. During the certification process, Interflex provided evidence of its own information security. Additionally, it was successfully demonstrated that the protection goals in the areas of confidentiality, integrity, and availability are met. This includes data protection, secure handling of information, security standards in software development, proof of trained personnel, and a secure selection of suppliers.