FreightON by Trans.eu: Keeping Your Data Secure

- Author: Marta Dunajko

Our clients’ data safety is our priority, and every day, we pursue to protect it from every angle – including technological, operational, and legal – by introducing numerous modern tools and robust measures. 

Also, we’d like to mention that Trans.eu is an EU-based company with over 20 years in the market as a tech solutions provider, fully compliant with European data security regulations.

Information Security Management: ISO Compliance

Trans.eu complies with ISO/IEC 27001 and confirms that its standards are maintained through annual internal audits and audits conducted by an external certification body, ensuring that our platform has met international security standards and mitigated risks of improper information management for the past 8 years

Personal Data Security: Compliance with the GDPR

Our ongoing compliance efforts build on our investments in protecting information privacy, confidentiality, and security, as well as implementing the operating procedures required by national law, General Data Protection Regulation, and other regulations.

For security purposes in this area, we:

  • Use secure encryption protocols during data transmission: SSL encryption,
  • Require strong passwords and two-factor authentication for user account logins,
  • We monitor data processing activities by implementing physical security measures to protect against unauthorized access.
  • We ensure that the data centers where we store our data and backups meet the highest cybersecurity standards.

System Security: Various Data Centers

Trans.eu is hosted in two major data centers in Europe: Talex and Amazon’s AWS – the most versatile and widely used cloud platforms in the world. All three are state-of-the-art data processing centers with robust security, continuous monitoring, detailed activity logs, and backup copies, protecting against data loss and reducing recovery times.

Network Security

We enforce secure network configurations and detect drift across all systems, applications, and devices. Our devices are protected by malware defenses and regularly scanned. Our infrastructure is monitored 24/7 with routine log reviews, and critical audit logs are regularly reviewed.

Customer Multi-factor Authentication (MFA) 

Access control through strong passwords, two-factor or multi-factor authentication (2FA/MFA), and role-based access levels makes it harder for cybercriminals to hack user accounts.

Data Encryption

All data in backup copies is encrypted using Advanced Encryption Standard (AES) – a highly secure encryption method used worldwide by governments and financial institutions, ensuring that, even if the data is stolen, it remains unreadable without the appropriate key.

Data Backups

Backups of all platform and internal data are performed regularly, encrypted, and stored at separate server locations. This enables us to fully restore data or verify its integrity in the event of a failure.

Third-party Access

Every subcontractor and provider of services and tools undergoes detailed verification to ensure they implement security measures that meet our standards for privacy protection, information security, and cybersecurity.