[{"data":1,"prerenderedAt":414},["ShallowReactive",2],{"{\"language\":\"es\",\"resolve_relations\":\"reference.source\",\"version\":\"published\"}legal/security":3},{"data":4,"headers":390},{"story":5,"cv":372,"rels":373,"links":389},{"name":6,"created_at":7,"published_at":8,"updated_at":9,"id":10,"uuid":11,"content":12,"slug":364,"full_slug":365,"sort_by_date":66,"position":366,"tag_list":367,"is_startpage":50,"parent_id":368,"meta_data":66,"group_id":369,"first_published_at":370,"release_id":66,"lang":72,"path":66,"alternates":371,"default_full_slug":66,"translated_slugs":66},"Security","2025-09-18T13:29:31.408Z","2025-11-26T13:31:46.190Z","2025-11-26T13:31:46.205Z",92211492546580,"843649ca-171a-4143-bb91-40d7e2514717",{"_uid":13,"body":14,"metadata":357,"password":29,"component":361,"redirect_url":29,"open_graph_image":362,"include_open_graph":50,"block_search_engines":50,"is_password_protected":50},"f5d3cdfe-490c-4c13-a1e6-5182d2e384ce",[15,75,114,118,258],{"_uid":16,"source":17,"component":74},"f680d281-e4fd-4c53-b7e1-f8a3eefad8ba",{"name":18,"created_at":19,"published_at":20,"updated_at":21,"id":22,"uuid":23,"content":24,"slug":64,"full_slug":65,"sort_by_date":66,"position":67,"tag_list":68,"is_startpage":50,"parent_id":69,"meta_data":66,"group_id":70,"first_published_at":71,"release_id":66,"lang":72,"path":66,"alternates":73,"default_full_slug":66,"translated_slugs":66,"_stopResolving":61},"Main Navigation","2025-04-09T14:04:01.876Z","2026-03-10T15:15:52.184Z","2026-03-10T15:15:52.242Z",27565407,"c5f4a23f-ca2c-41d7-946b-6822d34565a0",{"_uid":25,"items":26,"component":63},"8915070e-32eb-476d-b215-1c92ebdad15c",[27,43],{"_uid":28,"left_nav":29,"messages":30,"component":42,"right_nav":29},"fe7818a3-2c19-410c-adfd-6166e04c9bf0","",[31,37],{"_uid":32,"icon":33,"link":34,"target":29,"message":35,"component":36},"87585227-383a-48e2-a5e5-1541d3b4b65a","tdesign:user-talk-1","/contact","Have questions about our SDKs or enterprise applications? Talk to a Tech Soft 3D expert","element-notice-child",{"_uid":38,"icon":39,"link":40,"target":29,"message":41,"component":36},"45ffc4c7-d6cf-4d3c-9606-ec4154852aef","hugeicons:artificial-intelligence-04","/developers/products/hoops-ai","Check out our newest SDK, HOOPS AI, a framework for preparing CAD data for ML workflows","element-notice",{"_uid":44,"menu":45,"component":62,"has_notice":61},"192904e7-cc6e-44e5-95a7-187c8ef72d1e",[46,52,55,58],{"url":47,"_uid":48,"label":49,"new_tab":50,"component":51},"#","eada60f3-c50f-41c1-8c50-4ffedd119483","SDKs for Developers",false,"top-menu-child",{"url":47,"_uid":53,"label":54,"new_tab":50,"component":51,"style_as_button":50},"e80ecf91-c6c8-4e7a-a5b7-10ec4e05ada0","Apps for Businesses",{"url":47,"_uid":56,"label":57,"new_tab":50,"component":51,"style_as_button":50},"b3d091d9-83d1-4b72-bb8d-0f4be140beaa","Company",{"url":47,"_uid":59,"label":60,"new_tab":50,"component":51,"style_as_button":61},"f2040cd1-8c5b-4dcf-8ee1-5b56049d0fe2","Support",true,"top","global","main-navigation","es/global/main-navigation",null,-30,[],27501948,"998e76b0-7b0e-4635-8abf-c9db0f0bf29c","2025-04-09T15:16:40.189Z","es",[],"reference",{"_uid":76,"height":29,"slides":77,"actions":111,"alignment":29,"component":112,"background_opacity":113},"a51a4909-e3bb-401e-89b0-257d6d9b1c28",[78],{"_uid":79,"copy":80,"icon":96,"title":99,"action":29,"buttons":100,"eyebrow":29,"component":101,"icon_size":29,"background":102,"button_link":29,"button_label":29,"content_width":29,"title_heading":108,"button_new_tab":50,"background_video":109},"f454f0c3-7f89-435b-a3bf-13796fbf4411",{"type":81,"content":82},"doc",[83],{"type":84,"attrs":85,"content":86},"paragraph",{"textAlign":66},[87,89,92,93,94],{"type":88},"hard_break",{"text":90,"type":91},"Tech Soft 3D operates a comprehensive ISO 27001 Information Security Management System (ISMS) that governs how we protect information across our people, processes, and technology.","text",{"type":88},{"type":88},{"text":95,"type":91},"The ISMS is certified to the ISO 27001 standard, demonstrating our commitment to safeguarding data and continually improving our security practices.",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":98},"asset",{},"Security and Compliance at Tech Soft 3D",[],"element-epic-child",{"id":103,"alt":104,"name":29,"focus":29,"title":105,"source":29,"filename":106,"copyright":29,"fieldtype":97,"meta_data":107,"is_external_url":50},86135771993095,"Hands typing on a keyboard with overlayed padlock icons and network lines, symbolizing cybersecurity and data protection.","Data Security","https://a-us.storyblok.com/f/1023536/1920x1080/afd3e2b647/adobestock_230581609_security.jpg",{"alt":104,"title":105,"source":29,"copyright":29},"heading-h1",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":110},{},[],"element-epic","55",{"_uid":115,"height":116,"component":117},"70cb0d37-ac3b-430b-811a-10e9c8a077bb","large","element-spacer",{"gap":29,"_uid":119,"align":29,"count":120,"columns":121,"component":185,"remove_padding":61},"144782ce-517f-4ed5-89e2-be28d5341d89","column-two",[122,194],{"id":123,"_uid":124,"items":125,"component":193},"data-protection","c679d364-9f8b-4693-b9a6-90a11e521011",[126],{"_uid":127,"colors":29,"contents":128,"component":188,"background_image":189,"background_video":191},"f530faa3-9bf7-4ce9-8d04-0cc4b1e32d3d",[129,141,186],{"_uid":130,"icon":29,"image":131,"items":133,"title":134,"button":135,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":137,"description":138,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"979a5d4e-0c4e-494e-87dc-2574dda315b8",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":132},{},[],"Data Protection",[],"element-feature","bg-snow",{"type":81,"content":139},[140],{"type":84},{"gap":29,"_uid":142,"align":29,"count":29,"columns":143,"component":185,"remove_padding":61},"1b9c5f5c-49bb-44fe-a42d-e1d14da328a1",[144,166],{"_uid":145,"icon":146,"image":147,"items":149,"title":29,"button":150,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":151,"description":152,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"16bf7929-0772-44a9-9fd3-3a50c191ae11","hugeicons:database",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":148},{},[],[],"bg-white",{"type":81,"content":153},[154,161],{"type":155,"attrs":156,"content":158},"heading",{"level":157,"textAlign":66},3,[159],{"text":160,"type":91},"Data at Rest",{"type":84,"attrs":162,"content":163},{"textAlign":66},[164],{"text":165,"type":91},"All in-scope computers and servers are protected with AES-256 full-disk encryption.",{"_uid":167,"icon":168,"image":169,"items":171,"title":29,"button":172,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":151,"description":173,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"f905d0ae-cedb-4197-b9c9-8988b85f8356","tabler:arrows-left-right",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":170},{},[],[],{"type":81,"content":174},[175,180],{"type":155,"attrs":176,"content":177},{"level":157,"textAlign":66},[178],{"text":179,"type":91},"Data in Transit",{"type":84,"attrs":181,"content":182},{"textAlign":66},[183],{"text":184,"type":91},"TLS 1.2 or higher is utilised everywhere data is transmitted over potentially insecure networks.","columns",{"_uid":187,"height":116,"component":117},"68af0d3b-8137-4970-becf-8ae53e56e38f","backdrop",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":190},{},{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":192},{},"group",{"id":195,"_uid":196,"items":197,"component":193},"product-security","fe7332c5-0ba5-4cca-8540-45a4f38567e5",[198],{"_uid":199,"colors":29,"contents":200,"component":188,"background_image":254,"background_video":256},"808c9e9f-e790-439a-a0d4-bcc9c778547f",[201,211,252],{"_uid":202,"icon":29,"image":203,"items":205,"title":206,"button":207,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":137,"description":208,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"67584aa9-c6c8-4a0e-b281-bfb2df15af4d",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":204},{},[],"Product Security",[],{"type":81,"content":209},[210],{"type":84},{"gap":29,"_uid":212,"align":29,"count":29,"columns":213,"component":185,"remove_padding":61},"e66c668e-97b5-4ced-9cb4-e3c10261a2ab",[214,233],{"_uid":215,"icon":216,"image":217,"items":219,"title":29,"button":220,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":151,"description":221,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"5ec76936-cd97-4c24-ae66-76d81b0c7751","streamline:interface-text-formatting-list-bullets-points-bullet-unordered-list-lists-bullets",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":218},{},[],[],{"type":81,"content":222},[223,228],{"type":155,"attrs":224,"content":225},{"level":157,"textAlign":66},[226],{"text":227,"type":91},"Pen Testing & Application Security",{"type":84,"attrs":229,"content":230},{"textAlign":66},[231],{"text":232,"type":91},"Tech Soft 3D conducts regular penetration testing and application security assessments across our networks and web applications to identify and remediate potential vulnerabilities.",{"_uid":234,"icon":235,"image":236,"items":238,"title":29,"button":239,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":151,"description":240,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"c56cf2ac-e8ea-41d8-ab38-6474f370726b","lucide:clock-4",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":237},{},[],[],{"type":81,"content":241},[242,247],{"type":155,"attrs":243,"content":244},{"level":157,"textAlign":66},[245],{"text":246,"type":91},"Vulnerability Scanning",{"type":84,"attrs":248,"content":249},{"textAlign":66},[250],{"text":251,"type":91},"Regular vulnerability scans are carried out on Tech Soft 3D’s systems, with identified issues systematically tracked and remediated in line with our IT policy requirements.",{"_uid":253,"height":116,"component":117},"c626e54f-5db2-4573-a11a-8159634839f3",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":255},{},{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":257},{},{"id":259,"_uid":260,"items":261,"component":193},"enterprise-security","dbe55192-5cf9-492e-afb5-09a2b5efcd32",[262,275,355],{"gap":29,"_uid":263,"align":29,"count":29,"columns":264,"component":185,"remove_padding":61},"684d0ff7-5e29-48d2-b9e6-51214226f3fe",[265],{"_uid":266,"icon":29,"image":267,"items":269,"title":270,"button":271,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":137,"description":272,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"06e3f9b9-e8bd-49eb-ba71-e6c7c771d902",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":268},{},[],"Enterprise Security",[],{"type":81,"content":273},[274],{"type":84},{"gap":29,"_uid":276,"align":29,"count":277,"columns":278,"component":185,"remove_padding":61},"4f24d036-70c0-4125-87fd-d0c959d7dd3c","column-four",[279,298,317,336],{"_uid":280,"icon":281,"image":282,"items":284,"title":29,"button":285,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":151,"description":286,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"298098f0-3957-4b80-b44c-4430aa3b2230","material-symbols:grouped-bar-chart",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":283},{},[],[],{"type":81,"content":287},[288,293],{"type":155,"attrs":289,"content":290},{"level":157,"textAlign":66},[291],{"text":292,"type":91},"Endpoint Protection and Monitoring",{"type":84,"attrs":294,"content":295},{"textAlign":66},[296],{"text":297,"type":91},"All corporate devices are centrally managed with device management software and anti-malware protection. This enforces the secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates.",{"_uid":299,"icon":300,"image":301,"items":303,"title":29,"button":304,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":151,"description":305,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"ce1bc4d0-5413-4020-b528-463efd637e1e","hugeicons:hierarchy-square-02",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":302},{},[],[],{"type":81,"content":306},[307,312],{"type":155,"attrs":308,"content":309},{"level":157,"textAlign":66},[310],{"text":311,"type":91},"Secure Remote Access",{"type":84,"attrs":313,"content":314},{"textAlign":66},[315],{"text":316,"type":91},"Remote access to internal resources is secured using a modern VPN platform that requires MFA.",{"_uid":318,"icon":319,"image":320,"items":322,"title":29,"button":323,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":151,"description":324,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"e0392f08-2909-412a-983e-a8507529779b","streamline-ultimate:list-numbers-bold",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":321},{},[],[],{"type":81,"content":325},[326,331],{"type":155,"attrs":327,"content":328},{"level":157,"textAlign":66},[329],{"text":330,"type":91},"Security Awareness Training",{"type":84,"attrs":332,"content":333},{"textAlign":66},[334],{"text":335,"type":91},"All staff complete mandatory security awareness training during induction, with regular refresher training delivered company wide.",{"_uid":337,"icon":338,"image":339,"items":341,"title":29,"button":342,"eyebrow":29,"alignment":29,"component":136,"icon_size":29,"background":151,"description":343,"title_heading":29,"invert_text_color":50,"entire_region_linked":50},"f5ed9091-aca9-4454-9f73-b9e6fb52a18e","material-symbols:id-card-outline-sharp",{"id":66,"alt":66,"name":29,"focus":66,"title":66,"source":66,"filename":29,"copyright":66,"fieldtype":97,"meta_data":340},{},[],[],{"type":81,"content":344},[345,350],{"type":155,"attrs":346,"content":347},{"level":157,"textAlign":66},[348],{"text":349,"type":91},"Identity and Access Management",{"type":84,"attrs":351,"content":352},{"textAlign":66},[353],{"text":354,"type":91},"All staff are assigned a unique user account and granted role-based access to data.  Additional access requires a formal approval process and is controlled through our IT support ticketing system.",{"_uid":356,"height":116,"component":117},"5d0d49f3-50db-428d-8a84-09d33ee706d0",{"_uid":358,"title":359,"plugin":360,"description":29},"9a72e09b-2bfa-4c2d-92d5-4bcef98c0c18","Security and IT | Theorem Solutions","meta-fields","page",{"id":103,"alt":104,"name":29,"focus":29,"title":105,"source":29,"filename":106,"copyright":29,"fieldtype":97,"meta_data":363,"is_external_url":50},{"alt":104,"title":105,"source":29,"copyright":29},"security","es/legal/security",-80,[],92171526526146,"5d945f67-d0f8-4b01-96de-10e09fd26bda","2025-09-18T14:14:18.172Z",[],1775241858,[374],{"name":18,"created_at":19,"published_at":20,"updated_at":21,"id":22,"uuid":23,"content":375,"slug":64,"full_slug":65,"sort_by_date":66,"position":67,"tag_list":387,"is_startpage":50,"parent_id":69,"meta_data":66,"group_id":70,"first_published_at":71,"release_id":66,"lang":72,"path":66,"alternates":388,"default_full_slug":66,"translated_slugs":66},{"_uid":25,"items":376,"component":63},[377,381],{"_uid":28,"left_nav":29,"messages":378,"component":42,"right_nav":29},[379,380],{"_uid":32,"icon":33,"link":34,"target":29,"message":35,"component":36},{"_uid":38,"icon":39,"link":40,"target":29,"message":41,"component":36},{"_uid":44,"menu":382,"component":62,"has_notice":61},[383,384,385,386],{"url":47,"_uid":48,"label":49,"new_tab":50,"component":51},{"url":47,"_uid":53,"label":54,"new_tab":50,"component":51,"style_as_button":50},{"url":47,"_uid":56,"label":57,"new_tab":50,"component":51,"style_as_button":50},{"url":47,"_uid":59,"label":60,"new_tab":50,"component":51,"style_as_button":61},[],[],[],{"age":391,"cache-control":392,"connection":393,"content-encoding":394,"content-type":395,"date":396,"etag":397,"referrer-policy":398,"sb-be-version":399,"server":400,"strict-transport-security":401,"transfer-encoding":402,"vary":403,"via":404,"x-amz-cf-id":405,"x-amz-cf-pop":406,"x-cache":407,"x-content-type-options":408,"x-frame-options":409,"x-permitted-cross-domain-policies":410,"x-request-id":411,"x-runtime":412,"x-xss-protection":413},"1019","max-age=0, public, s-maxage=604800, stale-if-error=3600","keep-alive","gzip","application/json; charset=utf-8","Fri, 03 Apr 2026 18:44:59 GMT","W/\"ef7ac5a5a6864999ae635600edbfe15b\"","strict-origin-when-cross-origin","5.706.0","nginx/1.29.1","max-age=31536000","chunked","Origin,Accept-Encoding, Origin","1.1 de4b446a83a3d4a03a1417ff5f26322e.cloudfront.net (CloudFront)","88BFBn06kee6aqSK5zdcpP-Ki7rf_MyLiGI6UTry9UyLWDVTgzHghQ==","CMH68-P3","Hit from cloudfront","nosniff","SAMEORIGIN","none","8aa827cc-aca9-40b3-b349-fb6215a03ebb","0.030367","0",1775242918955]