Skip to content

Security at ePS

At ePS, safeguarding customer data and ensuring system integrity are fundamental to how we operate. Security is integrated into our product design, internal operations, and culture - enabling our customers to work with confidence and trust.

Corporate Swirly - White
GDPR-Compliant

GDPR Compliant

Data protection by design & default, with privacy controls across our products and operations.

data-privacy-Dc

Data Privacy Framework (DPF) Certified

ePS Packaging US, LLC is certified under the EU–U.S. DPF, the UK Extension, and the Swiss–U.S. DPF.

Verify listing (search “EPS Packaging US, LLC”)

Our Security Practices

We maintain a comprehensive security and privacy framework designed to safeguard data, prevent unauthorized access, and ensure service reliability. Our approach focuses on protecting information across people, processes, and technology.

Access Control & Identity Management

Role-based access, least-privilege principles, multi-factor authentication (MFA), and periodic reviews ensure that users have only the access they need.

Data Protection & Privacy

Sensitive data is encrypted during storage and transmission. Information is securely managed and shared only with authorized personnel.

Application & Infrastructure Security

Secure development practices, vulnerability testing, and regular updates help protect our applications and systems from threats.

Endpoint & Network Protection

Managed antivirus, vulnerability management, and continuous monitoring safeguard all devices and networks from threats.

Business Continuity & Incident Response

Tested recovery and response procedures minimize disruption and restore operations quickly.

Employee Awareness & Training

All employees complete security onboarding, annual awareness training, and phishing simulations.

Access Control & Identity Management

Role-based access, least-privilege principles, multi-factor authentication (MFA), and periodic reviews ensure that users have only the access they need.

Data Protection & Privacy

Sensitive data is encrypted during storage and transmission. Information is securely managed and shared only with authorized personnel.

Application & Infrastructure Security

Secure development practices, vulnerability testing, and regular updates help protect our applications and systems from threats.

Endpoint & Network Protection

Managed antivirus, vulnerability management, and continuous monitoring safeguard all devices and networks from threats.

Business Continuity & Incident Response

Tested recovery and response procedures minimize disruption and restore operations quickly.

Employee Awareness & Training

All employees complete security onboarding, annual awareness training, and phishing simulations.

Cloud Hosting Security

Our Cloud SaaS platforms are hosted on Amazon Web Services (AWS), providing a scalable, reliable, and secure environment. This foundation supports high availability, strong data protection, and a trusted experience for our customers.

Network Security

Layered defenses protect our systems from external and internal threats. Controls include IPS, WAF, DDoS protection, and regular vulnerability assessments & penetration testing.

Third-Party Risk Management

Vendors undergo due diligence, periodic security reviews, and contractual requirements for data protection. Continuous monitoring helps identify and address emerging risks.

Continuous Improvement

We conduct regular risk assessments and internal audits, perform periodic penetration testing, and update policies—continually investing in modern security tools and practices.

Area Customer-Deployed Cloud SaaS
Hosting & Infrastructure Operates within the customer’s own environment and controls. Hosted on secure cloud platforms with continuous monitoring and redundancy.
Data Security Customer manages infrastructure and data protection directly. Data is encrypted in transit and at rest, with logical separation between tenants.
Access Control Managed by the customer’s IT administrators. Managed with least-privilege access principles and multi-factor authentication.
Backup & Recovery Performed according to the customer’s internal policies. Automated daily backups with regular validation testing.

Contact Security

For more information about our security practices or to report a security concern, please contact our security team at security.packaging@epssw.com.

CORPORATE WATERMARK (Grey  half)