We use cookies to make your experience better when visiting our website. By continuing to browse the website, you are agreeing to our use of cookies.

SECURE. BY DESIGN AND DNA.

Our work with finer brands and some of the most demanding supply chain organizations in the world has set a high bar for our work in security. We live in a world where cyber threat is a real business risk and threat to business operation, value and brand. In this reality, security needs to be applied in the core DNA of culture, software and daily practices – it cannot be an afterthought.

We build on our insight and experience to implement security-aware software development, operational management, and threat mitigation practices that are essential to the strong protection of services and customer data.

Centiro has a systematic and risk-based approach to information security. And to keep it real, we consistently take ourselves to task to verify and challenge this externally, rendering several independently verified certifications in the field.

The result of our commitment to security is a holistic approach to our services offered, including business process, deployment and technical operation to support our customers’ business. We want our customers to enjoy a smooth ride, driven by business opportunity as opposed to fear. It is not about what we add. It is who we are.

COMMITTED TO COMPLY

Centiro complies with international standards and participates in third-party audits that verify our work in the field of security. The commitment stems from board-level and senior leadership to facilitate group wide application of policies, management systems and standards.

The Centiro Group is certified and complies with the following standards in the security field:

  • ISO 27001 Information Security
  • ISO 27017 Cloud Security
  • ISO 27018 Protection of Personal Identifiable Information
  • ISO 27032 Cybersecurity
  • ISO 22301 Business Continuity


The certification body is PECB. For more exhaustive information and our other certifications, see the Compliance section.