You have selected China. Based on your configuration, United States might be more appropriate. Do you want to keep or change the selection?

Security with TRUMPF | TRUMPF

Security with TRUMPF

At a glance: all important information and updates

Your security when working with TRUMPF products and services is a top priority for us. This is why we investigate and identify security vulnerabilities in order to protect your systems. You will receive security advisories from us, as well as a corresponding security update if necessary. On these pages, we present all important information and updates at a glance.

Our processes for your security

Secure software development process

A secure software development process is an important building block in our development procedure. It consists of a risk analysis, threat modeling, source code analyses and security test procedures, among other things. We predominately apply this process when developing new products as well as when programming new features for existing products.

Vulnerability management process

You can never guarantee 100 % security for software products. This is why we use our vulnerability management process to keep an eye on any weak spots and security vulnerabilities in our own or any external components affecting TRUMPF products and services, responding appropriately, for example by providing security advisories.

Standards considered

Generally valid and product-specific security requirements are identified and implemented within TRUMPF's secure software development process. TRUMPF complies with the ISO 27001 (for implementation of ISMS processes) and IEC 62443 standards (for the production of components and system engineering).

We work with

This is how you can support us with product security

Contact
TRUMPF Security
E-mail
Service & contact