1. Security
Security culture is embedded in our organization. Our ISO 27001 certification ensures relevant information security controls are in place. Our products are developed and tested following our Secure Software Development Lifecyle. Our employees receive continuous security-related training and regular phishing simulations. We apply a Zero Trust Security strategy both in our internal infrastructure and in our SaaS services, ensuring strict controls, continuous verification, and monitoring.

Encryption & Data Protection
All data is encrypted at rest and in transit using industry-leading standards like Advanced Encryption Standard (AES). We leverage cloud provider key management solutions and customer-dedicated SSL certificates to provide end-to-end encryption.
Threat Detection & Response
Our systems employ AI-driven advanced security monitoring through Extended Detection and Response (XDR) and Security Information and Event Management (SIEM). This covers everything from systems and users to email and malware.
Application Security
Our approach to application security is built on a comprehensive Secure Software Development Life Cycle (SDLC) framework, ensuring that security is embedded into every stage of our development process. We conduct continuous internal security testing, including both Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), to proactively identify and address vulnerabilities. Additionally, we regularly perform external penetration testing and threat modeling. This provides an added layer of assurance that our applications remain resilient against evolving threats.
Incident & Vulnerability Management
With a dedicated Security Operations Center (SOC) and Computer Security Incident Response Team (CSIRT), we ensure rapid response to any incidents. We have established specific channels for vulnerability reporting internally and for our customers. External parties can report incidents at security@consafelogistics.com.
2. Reliability
When you use Astro WMS® as a SaaS service, your business relies on us, and we are committed to delivering consistent, reliable performance at all times. This dedication is backed by a range of measures designed to ensure the highest levels of reliability and performance.

99.9% Uptime Commitment
Our services are built to ensure maximum reliability, with a 99.9% uptime commitment measured monthly and SLA status reporting available on demand.
Proactive Availability Monitoring 24/7/365
Around-the-clock monitoring ensures consistent availability, including full-stack service health checks and a dedicated support and response team. Application support is also available 24/7 through the Service Desk for both on-premises and SaaS solutions.
Self-healing Infrastructure Hosted In Public Cloud
The self-healing infrastructure, hosted in the public cloud, leverages automated recovery mechanisms driven by continuous health checks, supported by high availability and redundancy provided by the cloud vendor.
Continuously Validated Disaster Recovery Procedures
Disaster recovery is continuously validated through regular testing, dry runs, and constant monitoring and validation of application backups.
Secured And Geo-Redundant Data Backups
Data backups are secured and geo-redundant, protected against deletion and corruption, and replicated between public cloud regions for added resilience.
Global Data Residency Options
Public cloud flexibility provides access to over 300 data centers worldwide, ensuring compliance with regulations that mandate specific physical locations. This also ensures application performance with low-latency communication.
3. Compliance
We adhere to the highest industry standards to ensure compliance throughout our organization, products, and services. This commitment provides our employees, customers, and partners with the trust and confidence they deserve, knowing that we prioritize their security and satisfaction in everything we do.

Certification
We are ISO/IEC 27001 certified, covering all countries where Consafe Logistics operates.
Audits & Compliance Programs
We undergo annual internal and external compliance audits. Our ISO/IEC 27001 certification is audited by an independent accredited certification body.
Whistleblower Protection
Our whistleblower system is compliant with the European Whistleblowing Directive and local legislation, ensuring safe reporting for employees.
4. Privacy
The privacy of our customers, co-workers, and partners is prioritized, and we are dedicated to protecting your personal information.

Regulatory Compliance In Privacy
We adhere to all applicable laws and regulations, and as part of our ISO 27001 certification, we regularly review compliance with applicable data protection regulations. Our Information Security Management System (ISMS) includes controls to manage and update our privacy practices as regulations evolve.
Dedicated Privacy And Security Oversight
We have a dedicated function to address security and privacy matters to ensure that your information remains safe with us. Our privacy program includes comprehensive steering documents and established processes to safeguard data. We seek to implement the core principles of the General Data Protection Legislation (GDPR) in our steering documentation, processes, and ways of working. Transparency regarding how your data is managed is set forth in our privacy notices and data protection agreements with our customers.
Privacy In Test And Development
We use anonymization procedures for test and development environments to ensure privacy, both for Astro WMS® on-premises and SaaS solutions.