Trusted by
Industry Certifications and
Regulatory Compliance
We follow strict privacy and security rules, and comply with the most stringent international standards.

ISO 27001

Consultport is ISO 27001 certified.

SOC 2 Type 2

Consultport is SOC 2 Type 2 certified, in accordance with the AICPA Trust Service Criteria.

GDPR Compliance

Consultport is General Data Protection Regulation (GDPR) compliant.
Data Protection and Information Security
Our security methods go above and beyond what is usually done in the industry to make sure data is kept safe and secure.

Product Security

Production System Access Review
Security officer approves who can access the production system every year.

Incident Management
Consultport keeps a log of security incidents, how they were investigated, and the actions taken, following established guidelines.

Vulnerability Scanning
Regularly scan of the platform to find security weaknesses.

Vulnerability Handling
All security weaknesses are tracked and fixed according to set rules and procedures.

Data Security

Access and Multi-Factor Authentication
Access to critical systems is regularly reviewed and controlled with multi-factor authentication.

Access Revocation Upon Termination
Individual's access is immediately revoked after end of employment to avoid unauthorized access.

Data Security & Encryption
Customer data stored in production databases is encrypted while at rest to maintain confidentiality and integrity of sensitive information.

Infrastructure & Data Management
Consultport keeps an inventory of its infrastructure and follows a strict backup strategy with regular checks and tests for reliable data recovery.

Network Security

Security Analysis & Anomalous Behavior Detection
Consultport evaluates system-generated information and monitors audit events to spot unusual activities or threats.

Network Security & Firewall Protection
Consultport shields its networks, limiting external access and employing firewalls to protect against unauthorized access.

Data Transmission Confidentiality
Use of standard encryption methods including HTTPS and TLS, for data in transit.

Performance Monitoring & Security Logging
Consultport monitors asset performance and security, alerting on issues and logging security events for prompt response.

App Security

Privacy Notice Visibility
The latest service information is clearly shown on our website.

System Change Security
Procedures are in place for safely making changes to the system.

Change Approval
Specific steps to follow for approving system changes are defined.

Monitoring Unauthorized Actions
Alert system in place to adjust access for team members with role changes.

Endpoint Security

Malware Protection
Endpoints accessing critical data have anti-malware software.

Encryption
Endpoints accessing important servers or data are encrypted.

Device Compliance Verification
Measures are in place to verify the security and privacy standards of remote devices' software and patches before connecting internally.

Auto-Lock
Endpoints auto-lock after inactivity to prevent unauthorized access.

Endpoint Encryption
All critical endpoints are encrypted to protect them from unauthorized access.

Corporate Security

Policy and Training
Staff have to acknowledge conduct and security policies, and follow a job-specific security training.

Organizational Structure and Roles
Clear definitions of roles, responsibilities, and organizational structure for risk mitigation.

Risk Assessment and Compliance
Annual assessments for identifying threats and ensuring legal compliance.

Performance and Incident Reporting
Regular performance reviews and use of Governance, Risk and Compliance (GRC) platform for security monitoring, offering clear reporting channels for security issues.