Security and Privacy of Our EDI Conversion Tools

We take security and privacy very seriously. The architecture of our products helps with keeping them secure:

  • EDI Converter runs fully on-prem, on your computers inside your network or VPC. It does not connect to any external servers outside your network.
  • The converter does not use a database, and it does not store any data between calls. Once an EDI file is converted, all temporary files are deleted.
  • The converter is 100% Java, the distribution does not contain any binary files.

We have a rigorous security scanning and testing process:

  • We scan third-party dependencies/libraries for vulnerabilities
  • All dependencies are updated with each release
  • We perform emergency releases in case of zero-day exploits in third-party libraries
  • The docker container is also scanned