Skip links

Security continuous monitoring

At Axolt, the vulnerability scanning of our systems is managed by our service providers, who use state-of-the-art security measures to ensure the robustness of our services.

Here’s how we manage vulnerability scanning:


1. Managed Service Provider Scanning:
Our cloud-based managed service providers conduct regular vulnerability scans on our instances. These scans aim to identify any potential weaknesses that could be exploited by malicious entities.

2. Continuous Updates and Patches: As part of their service, our providers continually update and patch our instances to address any vulnerabilities identified. This proactive approach ensures that vulnerabilities are remedied in a timely manner.

3. Regular Security Reports: We receive regular reports from our service providers on their security activities, including the outcomes of vulnerability scans. These reports help us to stay informed about the security status of our instances.

4. Third-Party Audits: To further ensure the security of our systems, our providers are regularly audited by independent third parties. These audits confirm the effectiveness of their security practices, including vulnerability scanning.
While the actual vulnerability scanning is conducted by our managed service providers, we at Axolt take the responsibility of staying informed about the security status of our systems. We take prompt action whenever required, to ensure the security and integrity of our services.