Information Security

The following summary is intended to support customer security, compliance, and software supply‑chain due‑diligence activities/requirements.

# Info-Sec Related Frequently Asked Questions

Does DevExpress engineer commercial software apps (general purpose apps, web/SaaS apps, mobile apps, etc.)?

No

DevExpress does not engineer commercial software apps. DevExpress does not offer paid cloud services. As such, DevExpress does not store/manage third-party information (said differently, DevExpress does not store information on your customers/end-users).

DevExpress engineers/licenses software UI components/development libraries. DevExpress licenses source code (the DevExpress End User License Agreement governs use and redistribution of DevExpress intellectual property). Developers/development teams are entirely responsible for the use of DevExpress source code and how DevExpress source code is integrated into a software project.

DevExpress UI components/development libraries (source code) are rigorously tested. DevExpress employs secure development lifecycle practices and enforces software supply-chain security controls.

DevExpress enforces information security policies aligned with internationally recognized security frameworks/best practices, and continuously improves its security procedures based on risk assessment and business context. For an overview of DevExpress software development security procedures, please refer to the following:

Security - What You Need to Know | DevExpress Documentation

Does DevExpress store personally identifiable information in its encrypted customer database?

Yes

DevExpress stores the following personally identifiable information in its encrypted customer database:

  • Purchase-related information (company name, address, etc).
  • License-related information (who is authorized to develop solutions/products using our intellectual property – this includes the names/contact information of software developers authorized to use our license).
  • Correspondence related to our products/use of our products (this can be in the form of email or support-related traffic stored in an encrypted database).
  • IP/Geo-location/Login information – to track login activity and enforce geographic access restrictions in accordance with applicable laws, sanctions regimes, and internal security policies.

For additional information on the terms/conditions that govern use of DevExpress web properties/online services, please refer to the following:

Website Terms of Use - DevExpress | Privacy Policy - DevExpress

Does DevExpress have a management approved information security policy and has that policy been communicated to all applicable parties?

Yes

Does DevExpress have a Chief Information Security Officer (CISO)?

Yes

Does the DevExpress Board of Directors and/or its Executive Management Team directly formulate/review its corporate Information-Security Program?

Yes

Does DevExpress regularly review its Information-Security program/policies?

Yes, at least annually.

Does DevExpress have a formal security incident management/incident response plan?

Yes, incident response procedures are periodically tested and reviewed.

Does DevExpress maintain monitor systems/networks/devices for known security vulnerabilities and patch corporate assets (including servers, databases, computing devices) as warranted and/or necessary?

Yes

Does DevExpress have controls in place to detect and prevent unauthorized access to systems, sensitive information, and facilities?

Yes

DevExpress Access Control protocols are designed to protect organizational information assets by fully regulating how users, systems, and third parties gain access to data and facilities. DevExpress Access Control protocols ensure that access is granted appropriately, monitored continuously, and revoked promptly when no longer required, thereby safeguarding confidentiality, integrity, and availability across our enterprise.

DevExpress Access Control protocols ensure that only authorized individuals can access specific systems, applications, and physical locations. These protocols support regulatory compliance, reduce security risk, and enforce consistent, organization‑wide standards for identity, authentication, and authorization. Key principles underlying our Access Control protocols are:

  • Least Privilege: Users receive only the minimum access needed for their roles.
  • Need‑to‑Know: Sensitive information is restricted to individuals with a legitimate business requirement.
  • Separation of Duties: High‑risk activities are divided across roles to prevent misuse or fraud.
  • Accountability: All access is uniquely attributable to an individual and fully auditable.

Logical access is enforced through authentication mechanisms, role‑based and attribute‑based access models, and secure password/MFA requirements. Physical access to facilities and restricted areas is controlled through biometrics and surveillance systems.

Do firewalls protect all DevExpress network entry/exit points?

Yes

Do you require use of Multi-Factor Authentication (MFA) for access to corporate information systems?

Yes

Is Multi-Factor Authentication (MFA) available to customers/end-users accessing DevExpress web properties?

Yes

To enable multi-factor authentication (both email and authenticator-app based MFA is available), please visit: https://www.devexpress.com/MyAccount/

Does DevExpress store/track customer/end-user login activity and is this information available to customers/end users accessing DevExpress web properties?

Yes

To view 30-day login activity associated with your account, please visit: https://www.devexpress.com/MyAccount/.

Is personally identifiable customer data encrypted at rest and in transit?

Yes

Does DevExpress have a data backup and disaster recovery plan in place?

Yes

The DevExpress data backup and recovery plan is designed to safeguard critical information, maintain business continuity, and restore operations following data loss, corruption, or system failures. Our protocols define responsibilities, technologies, and procedures required to ensure data availability, integrity, and recoverability. DevExpress protocols help ensure that essential data/systems can be restored within acceptable timeframes, minimizing operational disruption. Like all DevExpress protocols, our data backup and disaster recovery plans comply with legal, regulatory, and contractual requirements.

The DevExpress data backup and recovery plan covers all mission-critical business systems, applications, databases, user data, cloud services, and on‑premises infrastructure. Policies require the use of management approved backup platforms, automation tools, and monitoring systems. Our backup-related infrastructure encrypts data at rest and in transit, enforces strict access controls, audit logging, and integrity validation. DevExpress backup environments are protected from malware, ransomware, and related threat vectors.

Does DevExpress offer security awareness training to staff members?

Yes

# Security & Resilience-related Frequently Asked Questions

Does DevExpress test its UI components/software development libraries to help mitigate security-related risks?

Yes

For a detailed summary on the steps we take to ensure the integrity of DevExpress deliverables, please visit: Security - What You Need to Know | DevExpress Documentation.

Does the DevExpress cyber security/resilience program include monitoring, threat analysis, malware protection, scanning, intrusion detection, and DDoS protection?

Yes

  • DevExpress uses multiple tools to scan its information systems for vulnerabilities. Third-Party tools used include: Microsoft Sentinel and Tenable Nessus.
  • DevExpress monitors all its external sites through BitSight’s security platform.
  • DevExpress uses CloudFlare to protect against Denial-of-Service attacks.

# SDLC & Supply Chain-related Frequently Asked Questions

Does DevExpress apply software supply-chain security controls throughout the development, build, and release lifecycle?

Yes

Source control access restrictions. We enforce Least Privilege Access (LPA) via GitHub/GitLab Enterprise CI/CD using corporate authentication methods (Microsoft 365). Code repositories require Multi-Factor Authentication (MFA). We employ a 'Branch Protection' policy that strictly prohibits direct commits to main/production branches. Every change requires at least two independent peer reviews and a successful build status before merging.

CI/CD hardening. DevExpress uses secure and authenticated methods (GitHub Actions, GitLab CI/CD) to publish product code, tools, installations (Trusted Publishing), avoiding reliance on long-lived API tokens. Our build pipelines run on ephemeral, isolated runners that are destroyed after every job to prevent persistent threats. All pipeline configurations are managed as code (YAML and other configuration files) and are subject to the same peer-review process as application code.

Automated scanning. DevExpress uses a multi-layered scanning strategy for every PR (code repositories and container images are continuously and automatically scanned for vulnerabilities during the CI/CD process) prior to release. This includes Static Application Security Testing (SAST) for product source code, Software Composition Analysis (SCA) for vulnerable third-party libraries/license compliance, antiviral software installation and artifact scanning. High-risk vulnerabilities trigger an automatic 'Build Fail'. DevExpress employs a combination of commercial and internally managed security tools (including, but not limited to Veracode, Dependabot, CodeQL, NuGet Audit, VirusTotal, etc). DevExpress automated hooks and manual code review processes prevent accidental commits of API keys or credentials (Secret Detection).

Artifact integrity. Every production-ready artifact is cryptographically signed, our public key and checksum are available for validation. This enables customers to independently verify the authenticity and integrity of DevExpress product libraries throughout their lifecycle.

For additional information, see
Security - What You Need to Know | DevExpress Documentation

Does DevExpress manage its suppliers?

Yes

DevExpress evaluates security risks associated with critical third-party service providers and applies contractual, technical, and organizational safeguards as appropriate.

Does DevExpress maintain responsible disclosure/vulnerability reporting, handling and remediation process for released products policy?

Yes

DevExpress maintains a responsible disclosure process for security vulnerabilities reported by employees, researchers, or customers. For additional information, see Security Advisories and Product Update Process.

Does DevExpress maintain post-market vulnerability handling and remediation process for released products?

Yes

DevExpress also has a documented vulnerability handling process that includes intake, triage, remediation, and customer notification. Security fixes are prioritized based on severity and risk and are delivered through product updates and security advisories. For additional information, see Security Advisories and Product Update Process.

Does DevExpress provide security updates for supported product versions throughout their lifecycle?

Yes

DevExpress provides security updates and fixes for supported product versions in accordance with its product lifecycle and update policies. For additional information, see Supported Product Versions.

Does DevExpress support SBOM‑related requests for software composition transparency?

Yes

DevExpress provides relevant information to customers and publishes SBOM files in the CycloneDX format. For additional information in this regard, please review the following support ticket: Software Bill of Materials (SBOM) for DevExpress .NET assemblies/NuGet packages, JavaScript, VCL and other redistributable artifacts (must have a DevExpress.com account to view content).

# DevExpress Support & Client Center-related Frequently Asked Questions

Does DevExpress store credit card information in its encrypted database?

No

Does the DevExpress Support & Client Center (including associated internal systems and DevExpress network resources) require authentication by all internal users?

Yes

Does remote access to the DevExpress Support & Client Center (including associated internal systems and DevExpress network resources) require authentication by all remote users?

Yes

Does access to the DevExpress Support & Client Center (including associated internal systems and DevExpress network resources) require Multi-Factor Authentication (MFA)?

Yes

Does the DevExpress Support & Client Center (including associated internal systems and DevExpress network resources) employ robust access controls designed to restrict who can view, edit or delete data?

Yes

Is the DevExpress Support & Client Center (including associated internal systems and DevExpress network resources) scanned for vulnerabilities?

Yes

Is malware/anti-virus protection used to protect the integrity of DevExpress Support & Client Center data?

Yes

Is DevExpress Support & Client Center data encrypted at rest and in transit?

Yes

Is the management/development of the DevExpress Support & Client Center outsourced to a third party?

No

The DevExpress Support & Client Center are maintained/managed in-house. DevExpress does not use a third-party service provider for its Support & Client Center.

Where is DevExpress Support & Client Center data stored?

United States of America

Does DevExpress have a data backup and disaster recovery plan in place?

Yes

The DevExpress data backup and recovery plan is designed to safeguard critical information, maintain business continuity, and restore operations following data loss, corruption, or system failures. Our protocols define responsibilities, technologies, and procedures required to ensure data availability, integrity, and recoverability. DevExpress protocols help ensure that essential data/systems can be restored within acceptable timeframes, minimizing operational disruption. Like all DevExpress protocols, our data backup and disaster recovery plans comply with legal, regulatory, and contractual requirements.

The DevExpress data backup and recovery plan covers all mission-critical business systems, applications, databases, user data, cloud services, and on‑premises infrastructure. Policies require the use of management approved backup platforms, automation tools, and monitoring systems. Our backup-related infrastructure encrypts data at rest and in transit, enforces strict access controls, audit logging, and integrity validation. DevExpress backup environments are protected from malware, ransomware, and related threat vectors.

Has DevExpress published a Website Terms of Use?
Does DevExpress enforce geographic access restrictions to corporate systems in accordance with applicable laws, sanctions regimes, and internal security policies?

Yes

Are all support ticket attachments (images/videos/etc) submitted via the DevExpress Support Center automatically scanned by anti-virus software?

Yes

# Regulatory-related Frequently Asked Questions

Does DevExpress comply with the Payment Card Industry (PCI) Data Security Standard?

Yes, DevExpress is PCI scan compliant through July 13, 2026.

Does DevExpress comply with both the United States and European Union sanctions regime?

Yes

DevExpress fully complies with both the United States and European Union sanctions regime. DevExpress does not license its products nor offer support services to anyone residing in a sanctioned country. For additional information in this regard, refer to the DevExpress End User License Agreement.

For sanctions-related inquiries please email management@devexpress.com.

Does DevExpress comply with the European Union General Data Protection Regulation (GDPR)?

Yes

For additional information in this regard, please refer to the DevExpress Privacy Policy: https://www.devexpress.com/aboutus/privacy-policy.xml.

Does DevExpress comply with the California Consumer Privacy Act (CCPA)?

Yes

For additional information in this regard, please refer to the DevExpress Privacy Policy: https://www.devexpress.com/aboutus/privacy-policy.xml.

Does DevExpress have a Legal Entity Identifier (LEI) number in compliance with the EU’s Digital Operational Resilience Act (DORA)?

Yes

To obtain our LEI number, please contact the DevExpress Client Services Team.

Does DevExpress train employees with access to personally identifiable information on US/EU privacy laws/regulations?

Yes

Does DevExpress limit access to personally identifiable information?

Yes

Access to personally identifiable information is restricted to authorized personnel based on role, business need, and access approval processes. Personnel with access receive background checks where legally permissible and mandatory security and privacy training.

# Artificial Intelligence (AI)-related Frequently Asked Questions

Does DevExpress use Artificial Intelligence?

Yes

Has DevExpress instituted an AI governance program or policy?

Yes

DevExpress has established AI governance policies covering approved use cases, access controls, and risk management.

Do you restrict the use of non-approved AI tools/services by employees?

Yes

DevExpress restricts employee use of generative AI tools to approved AI tools and services provided under existing corporate agreements or otherwise approved under internal policy. Currently, DevExpress employees are authorized to use approved enterprise AI services, including Microsoft enterprise AI services (such as Microsoft 365 Copilot, GitHub Copilot and Azure OpenAI), which operate within Microsoft’s enterprise security and compliance boundary and are governed by contractual data protection commitments.

The use of consumer or unmanaged AI services is prohibited by internal policy. These internal policies are designed to reduce risks associated with unintended data disclosure and ensure that AI usage aligns with DevExpress security, privacy, contractual, and customer-specific obligations.

Do you restrict the use of AI to specific teams/roles?

Yes

Does DevExpress use personally identifiable customer information to train AI models?

No

DevExpress does not use personally identifiable customer information or Support Center content to train general purpose AI models.