FreightON by Trans.eu: Keeping Your Data Secure
Our clients’ data safety is our priority, and every day, we pursue to protect it from every angle – including technological, operational, and legal – by introducing numerous modern tools and robust measures.
Also, we’d like to mention that Trans.eu is an EU-based company with over 20 years in the market as a tech solutions provider, fully compliant with European data security regulations.
Information Security Management: ISO Compliance
Trans.eu complies with ISO/IEC 27001 and confirms that its standards are maintained through annual internal audits and audits conducted by an external certification body, ensuring that our platform has met international security standards and mitigated risks of improper information management for the past 8 years.
Personal Data Security: Compliance with the GDPR
Our ongoing compliance efforts build on our investments in protecting information privacy, confidentiality, and security, as well as implementing the operating procedures required by national law, General Data Protection Regulation, and other regulations.
For security purposes in this area, we:
- Use secure encryption protocols during data transmission: SSL encryption,
- Require strong passwords and two-factor authentication for user account logins,
- We monitor data processing activities by implementing physical security measures to protect against unauthorized access.
- We ensure that the data centers where we store our data and backups meet the highest cybersecurity standards.
System Security: Various Data Centers
Trans.eu is hosted in two major data centers in Europe: Talex and Amazon’s AWS – the most versatile and widely used cloud platforms in the world. All three are state-of-the-art data processing centers with robust security, continuous monitoring, detailed activity logs, and backup copies, protecting against data loss and reducing recovery times.
Network Security
We enforce secure network configurations and detect drift across all systems, applications, and devices. Our devices are protected by malware defenses and regularly scanned. Our infrastructure is monitored 24/7 with routine log reviews, and critical audit logs are regularly reviewed.
Customer Multi-factor Authentication (MFA)
Access control through strong passwords, two-factor or multi-factor authentication (2FA/MFA), and role-based access levels makes it harder for cybercriminals to hack user accounts.
Data Encryption
All data in backup copies is encrypted using Advanced Encryption Standard (AES) – a highly secure encryption method used worldwide by governments and financial institutions, ensuring that, even if the data is stolen, it remains unreadable without the appropriate key.
Data Backups
Backups of all platform and internal data are performed regularly, encrypted, and stored at separate server locations. This enables us to fully restore data or verify its integrity in the event of a failure.
Third-party Access
Every subcontractor and provider of services and tools undergoes detailed verification to ensure they implement security measures that meet our standards for privacy protection, information security, and cybersecurity.