{"id":1341,"date":"2025-09-13T11:53:59","date_gmt":"2025-09-13T15:53:59","guid":{"rendered":"https:\/\/www.softwareag.com\/?page_id=1341"},"modified":"2026-01-05T11:07:04","modified_gmt":"2026-01-05T15:07:04","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.softwareag.com\/br\/company\/trust-portal\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<p>SAG Deutschland GmbH has implemented a security framework to define and govern the security measures we have in place. It is based on industry-leading best practices and internationally recognized standard.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-secondary-button is-style-secondary-button--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/app\/uploads\/2025\/09\/Information-Security.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" data-no-translation>Software AG Information Security<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-ens-esquema-nacional-de-seguridad-in-english-national-security-framework\">ENS &#8211; Esquema Nacional de Seguridad (in English \u2018National Security Framework\u2019)<\/h2>\n\n\n\n<p>A <a href=\"https:\/\/ens.ccn.cni.es\/en\/\">ENS<\/a> is a security framework, regulated by the government of Spain through the Royal Decree 311\/2022, managed by the CCN &#8211; Centro Criptol\u00f3gico Nacional. This framework is applicable to the entire Spanish Public Sector, as well as to suppliers collaborating with the Spanish administration.<\/p>\n\n\n\n<p>ENS provides a set of basic principles and minimum requirements necessary for the adequate protection of the information processed and the services provided by the entities within its scope. Its goal is to ensure proper security for information and services used electronically in the exercise of their competences.<\/p>\n\n\n\n<p>Software GmbH and SAG Deutschland GmbH are certified under the ENS MEDIUM category, which has been attested by an independent certification body accredited by CCN.<\/p>\n\n\n\n<p><a href=\"\/app\/uploads\/2025\/09\/ENS_Certificate_34_5704_25_05126_SOFTWARE-AG_CAST-ENG-2.pdf.sagdownload.inline.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" data-no-translation>Click here to access the certificate<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"612\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png\" alt=\"ENS Certification Badge\" class=\"wp-image-1344\" style=\"width:163px;height:auto\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png 502w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image-246x300.png 246w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image-10x12.png 10w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cyber-essentials\">Cyber Essentials<\/h2>\n\n\n\n<p>A <a href=\"https:\/\/www.itgovernance.co.uk\/cyber-essentials-scheme?promo_name=megamenu-cybersecurity&amp;promo_id=info-cyberessentials&amp;_gl=1*1cxp5x5*_up*MQ..*_ga*NDIwNzUxMjM4LjE3NTIxNjg0NDM.*_ga_MC7BZLZFSK*czE3NTIxNjg0NDAkbzEkZzEkdDE3NTIxNjkyMjMkajYwJGwwJGgw\">Cyber Essentials<\/a> scheme is a UK government-backed framework supported by the National Cyber Security Centre.&nbsp;<\/p>\n\n\n\n<p>The scheme is designed to help organizations demonstrate their commitment to cyber security and help them to protect against the most common cyber threats.<\/p>\n\n\n\n<p>&nbsp;Software AG UK Ltd has achieved Cyber Essentials certification demonstrating its commitment to data protection and cyber security.<\/p>\n\n\n\n<p><a href=\"\/app\/uploads\/2025\/09\/UK-Cyber-Essentials-Certificate.pdf.sagdownload.inline.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" data-no-translation>Click here to access the certificate<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"292\" height=\"349\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image-1.png\" alt=\"Cyber Essentials Certified badge\" class=\"wp-image-1345\" style=\"width:152px;height:auto\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image-1.png 292w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image-1-251x300.png 251w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image-1-10x12.png 10w\" sizes=\"auto, (max-width: 292px) 100vw, 292px\" \/><\/figure>\n<\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>SAG Deutschland GmbH has implemented a security framework to define and govern the security measures we have in place. It is based on industry-leading best practices [&hellip;]<\/p>","protected":false},"author":9,"featured_media":0,"parent":1323,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1341","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Information Security | Software AG<\/title>\n<meta name=\"description\" content=\"Explore the importance of Information Security at Software AG and how it aligns with the ENS security framework in Spain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/br\/company\/trust-portal\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security\" \/>\n<meta property=\"og:description\" content=\"Explore the importance of Information Security at Software AG and how it aligns with the ENS security framework in Spain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/br\/company\/trust-portal\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-05T15:07:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/\",\"url\":\"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/\",\"name\":\"Information Security | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png\",\"datePublished\":\"2025-09-13T15:53:59+00:00\",\"dateModified\":\"2026-01-05T15:07:04+00:00\",\"description\":\"Explore the importance of Information Security at Software AG and how it aligns with the ENS security framework in Spain.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\/\/www.softwareag.com\/en\/company\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trust Portal\",\"item\":\"https:\/\/www.softwareag.com\/en\/company\/trust-portal\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security | Software AG","description":"Explore the importance of Information Security at Software AG and how it aligns with the ENS security framework in Spain.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/br\/company\/trust-portal\/information-security\/","og_locale":"pt_BR","og_type":"article","og_title":"Information Security","og_description":"Explore the importance of Information Security at Software AG and how it aligns with the ENS security framework in Spain.","og_url":"https:\/\/www.softwareag.com\/br\/company\/trust-portal\/information-security\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2026-01-05T15:07:04+00:00","og_image":[{"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/","url":"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/","name":"Information Security | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png","datePublished":"2025-09-13T15:53:59+00:00","dateModified":"2026-01-05T15:07:04+00:00","description":"Explore the importance of Information Security at Software AG and how it aligns with the ENS security framework in Spain.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/image.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/company\/trust-portal\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.softwareag.com\/en\/company\/"},{"@type":"ListItem","position":3,"name":"Trust Portal","item":"https:\/\/www.softwareag.com\/en\/company\/trust-portal\/"},{"@type":"ListItem","position":4,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Solu\u00e7\u00f5es e servi\u00e7os de transforma\u00e7\u00e3o digital da Software AG","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/pages\/1341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/comments?post=1341"}],"version-history":[{"count":8,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/pages\/1341\/revisions"}],"predecessor-version":[{"id":4570,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/pages\/1341\/revisions\/4570"}],"up":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/pages\/1323"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media?parent=1341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}