XCMG 467.8 -0.4%
MANITEX 757.8 +1.3%
AMERICAN 732.9 -1.2%
SHUTTLELIFT 683.4 +2.2%
GALION 709.8 -0.5%
DEMAG 891.2 +1.8%
TEREX 234.5 -0.7%
LIEBHERR 567.3 +3.1%
πŸ”’
SOC 2 Type II
Certified
πŸ›‘οΈ
ISO 27001
Compliant
πŸ”
256-bit SSL
Encryption
βœ…
GDPR
Compliant

Our Security Commitment

At CRANE INTELLIGENCE, security is not just a featureβ€”it's a fundamental principle that guides everything we do. We understand that our platform handles sensitive business data and financial information, which is why we've implemented enterprise-grade security measures to protect your information.

Our security program is designed to meet the highest industry standards and is regularly audited by independent third parties to ensure compliance and effectiveness.

Data Protection Measures

πŸ” Encryption

All data is encrypted both in transit and at rest using industry-standard encryption protocols.

πŸ”’
AES-256 Encryption
Military-grade encryption for data at rest
🌐
TLS 1.3
Latest protocol for data in transit

πŸ›‘οΈ Access Controls

Multi-layered access controls ensure only authorized personnel can access your data.

πŸ‘€
Multi-Factor Authentication
Required for all administrative access
πŸ”‘
Role-Based Access
Granular permissions based on job function

πŸ” Monitoring

Continuous monitoring and logging of all system activities and access attempts.

πŸ“Š
Real-time Monitoring
24/7 security operations center
🚨
Anomaly Detection
AI-powered threat detection

Infrastructure Security

Our infrastructure is built on secure, enterprise-grade cloud platforms with multiple layers of protection:

  • Secure Data Centers: Tier III+ facilities with 99.99% uptime SLA
  • Network Security: Firewalls, DDoS protection, and intrusion detection systems
  • Backup & Recovery: Automated backups with point-in-time recovery capabilities
  • Disaster Recovery: Multi-region redundancy and failover systems
  • Physical Security: Biometric access controls and 24/7 surveillance

Compliance & Certifications

SOC 2 Type II

Audited controls for security, availability, and confidentiality

ISO 27001

International standard for information security management

GDPR

Full compliance with European data protection regulations

CCPA

California Consumer Privacy Act compliance

HIPAA

Healthcare data protection standards (where applicable)

PCI DSS

Payment card industry data security standards

Incident Response

Our Response Process

In the unlikely event of a security incident, we have a comprehensive response plan:

1

Detection

Automated systems detect and alert on potential threats

2

Assessment

Security team evaluates the scope and impact

3

Containment

Immediate steps to prevent further damage

4

Investigation

Detailed analysis to understand the root cause

5

Recovery

Restore services and implement fixes

6

Communication

Notify affected users and stakeholders

Security Best Practices

We follow industry best practices and continuously improve our security posture:

  • Regular Security Audits: Quarterly assessments by independent security firms
  • Penetration Testing: Annual ethical hacking exercises to identify vulnerabilities
  • Security Training: Ongoing education for all employees on security awareness
  • Vulnerability Management: Proactive identification and remediation of security issues
  • Code Reviews: All code changes undergo security review before deployment
  • Dependency Scanning: Automated scanning for vulnerable third-party components
Security Contact: If you discover a security vulnerability or have security concerns, please contact us immediately at security@craneintelligence.com. We take all security reports seriously and will respond within 24 hours.

Questions About Our Security?

If you have any questions about our security measures or need additional information, please contact us:

Security Team: security@craneintelligence.com
General Inquiries: support@craneintelligence.com
Phone: +1 (555) CRANE-01