TradeCentric’s Commitment to Security
Security is top priority for TradeCentric. With integration data from nearly 4,500 customers worldwide, it is imperative that our users trust their data is secure.
We utilize advanced technology and industry best practices to ensure we meet the highest compliance standards.
Global Data Security, Privacy and Compliance
Our software and systems are engineered to prioritize data privacy and security, with several measures in place
Standardized encryption processes for PCI data
TradeCentric integrates with leading payment providers that offer standardized processes to secure PCI data and reduce fraud risk.
Peppol global invoicing
We include a Certified Peppol Access Point for global invoicing, streamlining cross-border transactions with standardized data exchange and regulatory compliance.
EU General Data Protection Regulation
TradeCentric ensures compliance with the EU GDPR by prioritizing the secure handling and protection of customer data across all our solutions.
EU-U.S. Privacy Shield Framework
We comply with the EU-U.S. Privacy Shield Framework, ensuring secure and compliant personal data transfer between the EU and U.S.
Certifications
Security certifications at TradeCentric demonstrate our commitment to safeguarding customer data, ensuring compliance, and maintaining high standards of trust and reliability across our platform and solutions.
- ISO 27001 Certification
- SOC 2 Type 2 Certification
Internal Security Measures
At TradeCentric, we prioritize internal security measures, implementing strict protocols and regular audits to protect sensitive data and ensure the integrity of our systems.
- Security Awareness Training
- Phishing Testing
- New Employee Training
Security Culture
Security is ingrained in our culture from the top down. Our security leadership meets to review any risks, findings, or program changes. To protect our customers’ information, we use industry-leading technology in several key areas:
State-of-the-Art Hosting
Ensures secure and reliable data storage.
Vulnerability and Penetration Testing
Regularly tests for and addresses potential security threats.
MSSP for Event Monitoring
Provides continuous security event monitoring.
Ongoing Code-Scanning During Development
Identifies and fixes vulnerabilities during the development process.
Encryption
Your data is encrypted at all times in transit and at rest.