Back to top

Cybersecurity and privacy are designed into our digital services and connectivity to bring our customers peace of mind in the digital world.

Solutions and services

img_KONE_Icon_elevator

We build solutions and services that are secure from end to end

anomaly detection

img_KONE_Icon_analysis

We monitor to detect anomalies that might indicate decline in security

Ready to respond

img_KONE_Icon_check

We are prepared to respond to security incidents

  • KONE follows secure software development processes when designing new solutions, including for example threat modeling, code and design reviews, and security testing​.
  • Security is validated through automated and manual testing​.
  • When a security incident is noticed, it is investigated, and remedial actions are taken.​
  • KONE tracks security vulnerabilities from several sources, both internal and external​.
  • KONE connectivity devices and cloud software is regularly updated to fix vulnerabilities and improve security.

We use cookies to optimize site functionality and to give you the best possible experience while browsing our site. If you are fine with this and accept all cookies, just click the 'Accept' button. You can also review our privacy statement.

Would you like to explore our corporate site or visit your local website?

Stay on Corporate site

Would you like to browse the solutions available in your area and the local contact information? Please go to your local website.

Your suggested website is

United States

Go to your suggested website