
Cybersecurity at ZEISS Medical Technology
Protecting products and data

ZEISS Cybersecurity experts
Behind every product
Working across our organization, and in collaboration with our partners and customers, our global team of information security experts is dedicated to protecting your products and your data.
Their expertise in secure product lifecycle development processes helps to prevent, detect and respond to cyber threats and to ensure our products adhere to quality standards.
Our security experts work closely with business and product management to integrate information security and data privacy within our products embedding “Secure by Design” and “Privacy by Design” principles and processes throughout the product lifecycle. With our developers and suppliers, the team enhances the security of our products and monitors the product lifecycle and cybersecurity landscape for potential risks, vulnerabilities and threats, acting quickly to mitigate.

360° Secure product lifecycle
Management and mitigation of security risks
Our products are designed, tested and maintained based on industry standards and best practices to manage security risks across the product lifecycle. Our products are equipped with integrated security features and controls, allowing our customers to securely deploy, operate, and ensure compliance to standards and regulations such as, HIPAA, GDPR and ISO 27001 within their specific environments. Within our product generation and product lifecycle processes, we address:
- Authentication and authorization
- Access controls
- Auditing and logging
- Data backup and recovery
- Data encryption (at rest & in transit)
- Malware detection/protection
- Secure configuration and hardening
With a 360° cybersecurity risk management process across our products, we can identify, assess, mitigate and effectively manage security risks against the evolving cybersecurity threat landscape in a timely and consistent manner.
ZEISS Cybersecurity FAQs
-
Yes. Our ZEISS Cybersecurity and Data Privacy Governance Program is designed to support and protect our products and services, ensuring the confidentiality, integrity, and availability of our customers’ data and systems.
Through our ZEISS Cybersecurity and Data Privacy Governance Program, our dedicated team of security experts work across the organization to integrate information security and data privacy within our products and across the product lifecycle. They provide governance, guidance and oversight of information security and data privacy. They establish policies, processes and procedures, fostering a culture of best practices, to ensure our products adhere to quality standards, and to prevent, detect and respond to cyber threats.
Our team of experts, addressing product security throughout the product lifecycle, consists of:
- Business Information Security Officers (BISO)
- Information Security Managers (ISM)
- Information Security Officers (ISO)
- Product Security Officers (PSO)
- Security Engineers
- Cloud Security Specialists
- Data Privacy Experts
- Threat and Vulnerability Managers
These experts address security topics in our product generation process, such as:
- Authentication and authorization
- Access controls
- Auditing and logging
- Data backup and recover
- Data encryption (at rest & in transit)
- Malware detection/protection
- Secure configuration and hardening
-
Yes. We review of our policies and procedures regularly and update them, as needed.
-
Yes. We have a vendor management program in place which includes a thorough evaluation of third-party vendors’ cybersecurity practices before engagement. We assess their security controls, conduct audits, and require their adherence to our cybersecurity policies.
-
We utilize a risk assessment framework that considers the potential impact as well as exploitability and likelihood of various cybersecurity risks. This helps prioritize and allocate resources effectively to address the most critical risks first. We stay up to date on emerging threats and vulnerabilities which helps to ensure our risk assessments remain comprehensive.
-
Yes. Threat modeling, according a recognized method, is required and is performed per process.