As a logistics company you want your or your customers goods transported in a reliable and safe way. You will do anything to make sure the goods will not be lost or damaged on its way. But how secure and safe is your software and how is this accomplished? The security of your software is just as important for your business as the security of your goods. Just like you do not want to lose any physical cargo, we do not want your data to be lost or handled unsecured and unsafe. Not only your transport needs to be secured, also the software you are using.
Within Adaption security is one of the main priorities. We make sure that security is at its best in different ways:
All of our software is available in the cloud, which means that all our logistics software can be accessed by an internet browser. To work safely in the cloud, a secured connection is needed. The software of Adaption is secured by an encrypted connection, an SSL certificate. This certificate is published by GlobalSign. GlobalSign is one of the most reliable publishers of SSL certificates. The SSL certificates are used by companies like Ford, Toyota, Netflix, Microsoft and BBC.
Do you want to check the safety of our connection? Please, take a look here on the website of SSL labs.
Another safety measure is the implementation of APEX-SERT into our developement and testing process. This tool evaluates the application on several security risks and identifies any vulnerabilities. APEX-SERT is fully integrated into the application builder, the developing software we use to develop our software. Many companies are using APEX-SERT after developing software to evaluate the software. We work differently. APEX-SERT is a part of our developing process and our APEX-SERT checks every environment on possible threats every night. After the checks, we receive a status mail with issues regarding the security standards. If there are any issues we take immediately action to fix the issues. To secure the safety of our clients’ software solution we only release our software when the score is 100%. Our goal is to have a perfect score always .
A super safe hosting environment
When freight is transported it is easy to say in what kind of environment it is located. This can be a very secured warehouse with a lot of security measures, but also a barn somewhere on an isolated industrial area, somewhere everyone can walk in and out any time. Our software is hosted on our own server in a super safe hosting environment. It is located in a bunker at Schiphol, we use to call it “the Bunker”. This bunker fully complies with European legislation.
Multiple internet connections and redundant firewalls make sure that there is connectivity with the outside world. The entire environment is based in the state-of-the-art data centre of Equinix on the Amstel Business Parc. The servers are located in one of the best data centres of the Netherlands: TeleCity 4 – Amstel Business Parc and the back-up is located in TeleCity 5, both are located in Amsterdam. The locations are connected with a double 10Gbe ring (20Gbe throughput).
The data centre takes care of highly availability of the environment (security, fire, power) This server environment is watched continuously on potential troubles. The facilities meet the international standards like ISO 9001: 2008 for quality, OHSAS 18001:2007 for security, ISO/IEC 27001:2005 for information security and PCI-DSS chapter 9 for vulnerability.
It is almost impossible for someone to enter. All the spaces are conditioned and protected to fires, power loss and water damage. The physical server of Adaption runs on a Virtual Machine which runs on a shared hard drive by RAID. Because of this we were able to create a fall back scenario of five minutes. If the server crashes another server is up-and-running within five minutes.
Daily back-up database
A back-up of the data is made daily, this happens every night. All these back-ups will be saved for 30 days. The back-ups are saved offside, so not on the same location, but in another safe area. By saving the back-ups offside we are able to guarantee that your back-up data will never be lost.
Working in the Cloud has many advantages. One of them is that the software is always and everywhere available from every device. Yet, in some cases, it is not desirable that all users have access to sensitive information everywhere. It is possible to allow each user access to log in from a predefined list of IP-addresses.
Minimal access to the servers
We use a proxy server and this is set safely to avoid attacks like cross side scripting. Cross side scripting is an error in the security of a web application. This error is caused by a wrongly processed input. This wrongly processed input can be caused by cookies, URL requests of parameters. All other webservers and databases are closed for the outside world. There is no other possibility to reach this data than through this proxy server.
Within the application many different roles can be defined. A role determines which pages, processes and reports are allowed to be executed. For example, you can define that your transport planner is not allowed to edit or see the invoicing area or the employee administration. Another option is that a certain user can see data, but not edit the data. A user is able to have one or multiple roles, to define the users function.
All of the logistic software products of Adaption are Cloud solutions. To ensure that all your data is perfectly secured we use tenants. A tenant is a separated users environment which is specially configurated for the end users. Do you have multiple departments or companies and do you want to make use of the same software? A head tenant with different companies or departments underneath will be the solutions for you. All the master data like scenarios will be shared, but dossiers, quotations and invoices will be shown separately to the Tenants who are authorized to see the data.
Two factor authentication
You can log in with all our software solutions in two ways: via username and password or via a two-phase login. The two-phase login is an addition to logging in via the username and password. After the first log-in step, the user will see a code on his smartphone. This must be entered by the user in the second login screen. For this method, we use the TOTP, Time-based One-time Password algorithm.