Explore how AI procurement solutions revolutionize supply chain management with Turvo’s cloud TMS platform. Learn about enhancing efficiency, reducing costs, and future-proofing your business in our latest blog post.
Your trust is of the utmost importance to Turvo. Turvo strives to provide the supply chain with the world’s leading collaboration platform and we take the privacy and security of your data seriously.
Privacy, Defined by You
Customer Administrators can choose from a variety of predefined role-based access controls (RBAC) to govern the level of access they want to grant to the users in their ecosystem. For example, the Customer’s Administrator can dictate roles such as Viewer, Contributor, Editor, Operator, Owner and even Finance Admin who can access the Turvo platform.
Secure In-App Messaging
Turvo’s Messenger feature is a productivity tool that enables communication with other Turvo users, even ones outside your organization, further increasing efficiency and reducing the need for calls. Conversations related to particular customers and shipments can be tracked and retained as a point of reference as well.
We take pride in the security of our products and services. We are committed to building and implementing safeguards that put the security of our Customers and their supply chain first.
Secure Software Development
We provide annual training to Turvo developers to help identify and prevent common software vulnerabilities, including the OWASP Top 10. Developer code undergoes peer review prior to deployment, and internal security engineers and third-party security validators periodically analyze code for software components with a higher potential security risk.
Web Application Security Review
A third party assesses the security of the Turvo web application annually. We address findings from this assessment according to the risk they pose to the security of the Turvo service.
Security and privacy are built into our products and services by design. As our platform, products and services evolve, the security and privacy of our Customer’s supply chain remains a top priority.
End-to-End Data Protection
We require a defense in depth strategy that starts with a strong security architecture and layers in industry-leading encryption technologies to protect our Customer and member data both at-rest and in-transit.
Compliance and Transparency
We take compliance and transparency seriously. Our team is constantly assessing our platform and services against new requirements and implementing industry best practices. As needed, we will keep Customers updated on changes.