Are you leading or lagging in B2B eCommerce? Take our benchmark assessment to find out

TradeCentric’s Commitment to Security

Security is top priority for TradeCentric. With integration data from nearly 4,500 customers worldwide, it is imperative that our users trust their data is secure.

We utilize advanced technology and industry best practices to ensure we meet the highest compliance standards.

reset password

Global Data Security, Privacy and Compliance

Our software and systems are engineered to prioritize data privacy and security, with several measures in place

Standardized encryption processes for PCI data

TradeCentric integrates with leading payment providers that offer standardized processes to secure PCI data and reduce fraud risk.

Peppol global invoicing

We include a Certified Peppol Access Point for global invoicing, streamlining cross-border transactions with standardized data exchange and regulatory compliance.

EU General Data Protection Regulation

TradeCentric ensures compliance with the EU GDPR by prioritizing the secure handling and protection of customer data across all our solutions.

EU-U.S. Privacy Shield Framework

We comply with the EU-U.S. Privacy Shield Framework, ensuring secure and compliant personal data transfer between the EU and U.S.

police

Certifications

Security certifications at TradeCentric demonstrate our commitment to safeguarding customer data, ensuring compliance, and maintaining high standards of trust and reliability across our platform and solutions.

  • ISO 27001 Certification
  • SOC 2 Type 2 Certification
AICPA SOC
ethical hacking

Internal Security Measures

At TradeCentric, we prioritize internal security measures, implementing strict protocols and regular audits to protect sensitive data and ensure the integrity of our systems.

  • Security Awareness Training
  • Phishing Testing
  • New Employee Training

Security Culture

Security is ingrained in our culture from the top down. Our security leadership meets to review any risks, findings, or program changes. To protect our customers’ information, we use industry-leading technology in several key areas:

State-of-the-Art Hosting

Ensures secure and reliable data storage.

Vulnerability and Penetration Testing

Regularly tests for and addresses potential security threats.

MSSP for Event Monitoring

Provides continuous security event monitoring.

Ongoing Code-Scanning During Development

Identifies and fixes vulnerabilities during the development process.

Encryption

Your data is encrypted at all times in transit and at rest.