security.cargoez.com
Open in
urlscan Pro
2600:9000:2127:c200:3:d1d9:c100:93a1
Public Scan
URL:
https://security.cargoez.com/
Submission: On May 24 via automatic, source certstream-suspicious — Scanned from DE
Submission: On May 24 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Avow Solutions CARGOEZ SECURITY & TRUST PORTAL Avow Solutions is committed to maintaining confidentiality, integrity, and availability of information and data created, maintained, and hosted as part of our products and services. As a service provider/product, we understand the importance of providing clear information about our security practices, resources, and responsibilities within Avow Solutions so our customers can feel confident in choosing us as a trusted provider. Information Security Policies are defined for the necessary and applicable processes and are implemented and audited at least annually. This portal will provide more information about our security posture and access to security documentation. COMPLIANCE Our security measures exceed industry standards for data protection and security. SOC 2 Ongoing ISO 27001 Ongoing GDPR Ongoing POLICIES Information security policy Compliance policy Acceptable usage policy Access control policy Asset management policy Business continuity & disaster recovery policy View all 24 items CONTINUOUS MONITORING Our security measures exceed industry standards for data protection and security PRODUCT SECURITY Production System User Review Situational Awareness For Incidents DATA SECURITY Identify Validation Production Databases Access Restriction Multi-factor Authentication User Privileges Reviews User Access Reviews Encrypting Data At Rest View all 13 items NETWORK SECURITY Impact analysis Limit Network Connections External System Connections Transmission Confidentiality Anomalous Behavior Capacity & Performance Management View all 8 items APP SECURITY Conspicuous Link To Privacy Notice Secure system modification Approval of Changes Unauthorized Activities ENDPOINT SECURITY Malicious Code Protection (Anti-Malware) Full Device or Container-based Encryption Endpoint Security Validation Session Lock Endpoints Encryption CORPORATE SECURITY Code of Business Conduct Organizational Structure Roles & Responsibilities Competency Screening Personnel Screening New Hire Policy Acknowledgement View all 36 items Logos provided by Clearbit