No Current Event’s Coming Up | No Locations | Learn More >

Security

Governance

LogistiVIEW’s Security team establishes policies and controls, monitors compliance with those controls, and validates our security and compliance to third-party auditors.

Our policies are based on general security best practices and adapted to our guiding principles.

Limited Access

Access for specific business purposes.

Layered Security

Defense-in-depth.

Comprehensive Security

Defend all attack vectors.

Continuous Improvement

Test and monitor to improve security.

Collaboration

Educate and communicate with security stakeholders.

Security Certifications

SOC 2

(In Review Period)

ISO 27001

(In Review Period)

The LogistiVIEW trust center shows the active controls in place and active. Request access below.

(Opens in a new tab)

Data Protection

LogistiVIEW uses security best practices including encryption, layered access, and secret management for data protection.

Data At Rest

LogistiVIEW encrypts data at the file system level and sensitive data is encrypted at the column-level.

Data In Transit

LogistiVIEW utilizes TLS 1.2 or higher for all data transmissions.

Product Security

LogisitiVIEW’s Secure Development Lifecycle Policy includes several guiding principles and concepts that ensure LogistiVIEW delivers secure code to our customers.

Penetration Testing

LogistiVIEW conducts at a minimum annual penetration testing. Our entire infrastructure is within scope of the assessment including cloud infrastructure, web applications, and mobile applications.

Vulnerability Scans

LogistiVIEW conducts periodic vulnerability scans across our product offering including our SaaS infrastructure, Web application code base, and our mobile device application code base.