TRUST CENTER

Trust is something we strive to earn every day. At the core of our solutions lies a commitment to safeguarding your business and protecting your data. Our security measures, reliability protocols, compliance certifications, and data privacy controls ensure that when you partner with Consafe Logistics, you’re choosing resilience, reliability, and peace of mind. 

Explore our Trust Center to learn more about how we protect and support your business. 

1. Security 

Security culture is embedded in our organization. Our ISO 27001 certification ensures relevant information security controls are in place. Our products are developed and tested following our Secure Software Development Lifecyle. Our employees receive continuous security-related training and regular phishing simulations. We apply a Zero Trust Security strategy both in our internal infrastructure and in our SaaS services, ensuring strict controls, continuous verification, and monitoring. 

hands in front of a computer

Encryption & Data Protection

All data is encrypted at rest and in transit using industry-leading standards like Advanced Encryption Standard (AES). We leverage cloud provider key management solutions and customer-dedicated SSL certificates to provide end-to-end encryption. 

Threat Detection & Response

Our systems employ AI-driven advanced security monitoring through Extended Detection and Response (XDR) and Security Information and Event Management (SIEM). This covers everything from systems and users to email and malware.

Application Security

Our approach to application security is built on a comprehensive Secure Software Development Life Cycle (SDLC) framework, ensuring that security is embedded into every stage of our development process. We conduct continuous internal security testing, including both Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), to proactively identify and address vulnerabilities. Additionally, we regularly perform external penetration testing and threat modeling. This provides an added layer of assurance that our applications remain resilient against evolving threats. 

Incident & Vulnerability Management

With a dedicated Security Operations Center (SOC) and Computer Security Incident Response Team (CSIRT), we ensure rapid response to any incidents. We have established specific channels for vulnerability reporting internally and for our customers. External parties can report incidents at security@consafelogistics.com. 

2. Reliability

When you use Astro WMS® as a SaaS service, your business relies on us, and we are committed to delivering consistent, reliable performance at all times. This dedication is backed by a range of measures designed to ensure the highest levels of reliability and performance.

Hands holding screen tablet with a WMS software in a warehouse

99.9% Uptime Commitment

Our services are built to ensure maximum reliability, with a 99.9% uptime commitment measured monthly and SLA status reporting available on demand. 

Proactive Availability Monitoring 24/7/365

Around-the-clock monitoring ensures consistent availability, including full-stack service health checks and a dedicated support and response team. Application support is also available 24/7 through the Service Desk for both on-premises and SaaS solutions.

Self-healing Infrastructure Hosted In Public Cloud

The self-healing infrastructure, hosted in the public cloud, leverages automated recovery mechanisms driven by continuous health checks, supported by high availability and redundancy provided by the cloud vendor.

Continuously Validated Disaster Recovery Procedures

Disaster recovery is continuously validated through regular testing, dry runs, and constant monitoring and validation of application backups.  

Secured And Geo-Redundant Data Backups

Data backups are secured and geo-redundant, protected against deletion and corruption, and replicated between public cloud regions for added resilience.

Global Data Residency Options

Public cloud flexibility provides access to over 300 data centers worldwide, ensuring compliance with regulations that mandate specific physical locations. This also ensures application performance with low-latency communication. 

3. Compliance 

We adhere to the highest industry standards to ensure compliance throughout our organization, products, and services. This commitment provides our employees, customers, and partners with the trust and confidence they deserve, knowing that we prioritize their security and satisfaction in everything we do.

certification ISO27001 logo

Certification

We are ISO/IEC 27001 certified, covering all countries where Consafe Logistics operates.

Audits & Compliance Programs

We undergo annual internal and external compliance audits. Our ISO/IEC 27001 certification is audited by an independent accredited certification body

Whistleblower Protection

Our whistleblower system is compliant with the European Whistleblowing Directive and local legislation, ensuring safe reporting for employees.

4. Privacy 

The privacy of our customers, co-workers, and partners is prioritized, and we are dedicated to protecting your personal information. 

Our customer services agent wears headphones and smiles

Regulatory Compliance In Privacy ​

We adhere to all applicable laws and regulations, and as part of our ISO 27001 certification, we regularly review compliance with applicable data protection regulations. Our Information Security Management System (ISMS) includes controls to manage and update our privacy practices as regulations evolve. 

Dedicated Privacy And Security Oversight

We have a dedicated function to address security and privacy matters to ensure that your information remains safe with us. Our privacy program includes comprehensive steering documents and established processes to safeguard data. We seek to implement the core principles of the General Data Protection Legislation (GDPR) in our steering documentation, processes, and ways of working. Transparency regarding how your data is managed is set forth in our privacy notices and data protection agreements with our customers

Privacy In Test And Development

We use anonymization procedures for test and development environments to ensure privacy, both for Astro WMS® on-premises and SaaS solutions.