Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
English (US)
US English (US)
CO Spanish (Colombia)
  • Home
  • Cibersecurity and Compliance

Is Software Installation Restricted Solely to Authorized Personnel, with an Inventory of Approved Applications?

Written by Jhon Bairon Figueroa

Updated at November 6th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • wvx Digital Interaction
  • wvx Voice Interaction
  • wvx Conversational AI
  • wvx Control Interactions
  • wvx CRM
  • wvx Agent
  • wvx Studio
  • Cibersecurity and Compliance
  • Release
    wolkvox Manager release wolkvox Agent release wolkvox CRM release
+ More

Table of Contents

Description Features

Description

At Wolkvox, software installation on corporate devices is strictly restricted to authorized personnel, as part of the controls defined in the Information Security Management System (ISMS). This measure aims to prevent the installation of unapproved applications, which could compromise the security, integrity, and availability of the company’s systems and data.

To ensure compliance, an up-to-date inventory of permitted applications is maintained, and administrative permissions are exclusively assigned to trained and authorized personnel. Additionally, continuous monitoring is conducted to detect and block any unauthorized installation attempts.

 

Features

Software Installation Controls

  • Restriction of Administrative Permissions: Only authorized personnel (e.g., IT team) have permissions to install or modify software on corporate devices.
  • Inventory of Approved Applications: An updated list of permitted tools and applications is maintained, aligned with operational and security needs.
  • Block Unauthorized Software: Endpoint management solutions are used to prevent the execution of unapproved applications.

 

Monitoring and Compliance

  • Monitoring Tools: Automated systems are employed to detect unauthorized installation attempts and generate real-time alerts.
  • Periodic Audits: Corporate devices are reviewed to verify that only approved applications are used and that no vulnerabilities are introduced by unauthorized software.
  • Training and Awareness: Employees receive training on software installation policies and the risks associated with using unapproved applications.

 

 

approved inventory restricted installation

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Are All Changes Documented and Approved Through Formal Procedures?
  • Do Passwords in Wolkvox Meet the Defined Standard (Minimum 10 Characters, Alphanumeric) and Are They Rotated on First Login?
  • Are Technical Controls Implemented for Password Management, Such as Minimum Length, Complexity Rules, Forced Change on First Use, Periodic Rotation, and Preventing Reuse of Previous Passwords?

2025 Wolkvox

Information security policy | Privacy Policy

Expand