Trust, Safety and
Security

Keeping your data safe is our
top priority.

Consultport follows the newest security and privacy standards, offering a safe, reliable and compliant platform for companies of all sizes.

Trusted by

KKR logo
Babbel logo
RTL logo
Bosh logo
Microsoft logo
Philips logo
Solvay logo
C&A logo
Dr Oetker logo
EQT logo
ZF Group logo
Stihl logo
Dachser logo
LSG Group logo
Continental logo

Industry Certifications and
Regulatory Compliance

We follow strict privacy and security rules, and comply with the most stringent international standards.

certificate
ISO 27001
completed Completed
Consultport is ISO 27001 certified.
certificate
SOC 2 Type 2
completed Completed
Consultport is SOC 2 Type 2 certified, in accordance with the AICPA Trust Service Criteria.
certificate
GDPR Compliance
completed Completed
Consultport is General Data Protection Regulation (GDPR) compliant.

Data Protection and Information Security

Our security methods go above and beyond what is usually done in the industry to make sure data is kept safe and secure.

Product Security

completed
Production System Access Review
Security officer approves who can access the production system every year.
completed
Incident Management
Consultport keeps a log of security incidents, how they were investigated, and the actions taken, following established guidelines.
completed
Vulnerability Scanning
Regularly scan of the platform to find security weaknesses.
completed
Vulnerability Handling
All security weaknesses are tracked and fixed according to set rules and procedures.

Data Security

completed
Access and Multi-Factor Authentication
Access to critical systems is regularly reviewed and controlled with multi-factor authentication.
completed
Access Revocation Upon Termination
Individual's access is immediately revoked after end of employment to avoid unauthorized access.
completed
Data Security & Encryption
Customer data stored in production databases is encrypted while at rest to maintain confidentiality and integrity of sensitive information.
completed
Infrastructure & Data Management
Consultport keeps an inventory of its infrastructure and follows a strict backup strategy with regular checks and tests for reliable data recovery.

Network Security

completed
Security Analysis & Anomalous Behavior Detection
Consultport evaluates system-generated information and monitors audit events to spot unusual activities or threats.
completed
Network Security & Firewall Protection
Consultport shields its networks, limiting external access and employing firewalls to protect against unauthorized access.
completed
Data Transmission Confidentiality
Use of standard encryption methods including HTTPS and TLS, for data in transit.
completed
Performance Monitoring & Security Logging
Consultport monitors asset performance and security, alerting on issues and logging security events for prompt response.

App Security

completed
Privacy Notice Visibility
The latest service information is clearly shown on our website.
completed
System Change Security
Procedures are in place for safely making changes to the system.
completed
Change Approval
Specific steps to follow for approving system changes are defined.
completed
Monitoring Unauthorized Actions
Alert system in place to adjust access for team members with role changes.

Endpoint Security

completed
Malware Protection
Endpoints accessing critical data have anti-malware software.
completed
Encryption
Endpoints accessing important servers or data are encrypted.
completed
Device Compliance Verification
Measures are in place to verify the security and privacy standards of remote devices' software and patches before connecting internally.
completed
Auto-Lock
Endpoints auto-lock after inactivity to prevent unauthorized access.
completed
Endpoint Encryption
All critical endpoints are encrypted to protect them from unauthorized access.

Corporate Security

completed
Policy and Training
Staff have to acknowledge conduct and security policies, and follow a job-specific security training.
completed
Organizational Structure and Roles
Clear definitions of roles, responsibilities, and organizational structure for risk mitigation.
completed
Risk Assessment and Compliance
Annual assessments for identifying threats and ensuring legal compliance.
completed
Performance and Incident Reporting
Regular performance reviews and use of Governance, Risk and Compliance (GRC) platform for security monitoring, offering clear reporting channels for security issues.

Your data is safe with us.
Ready to get started?