Fleet management you can trust

Let's drive business. Further.

At Webfleet, we’re committed to the security and privacy of information. We invest contin­u­ously in our engineering, proven technologies, processes, and people to make sure we can always provide you the most reliable telematics service on the market. As one of the world‘s largest providers of telematics services, continual investment in our service is important. We’re always improving to make sure that we are the best partner in the field of telematics for our clients – now and in the future.

Reasons for Webfleet

ISO/IEC 27001:2017 Certified Information Security

Find out more⁠

99.95% uptime

SSL secure login

Find out more⁠

Local support

Offering reliable fleet management solutions for more than 20 years, data privacy and information security has always been essential for us at Webfleet. The ISO/IEC 27001:2017 certi­fi­cation underpins that we're in complete control of our processes, and even more importantly, that our customer's data is in safe hands and protected.
Jan-Maarten De Vries, CEO Webfleet

Information Security Management System

The cornerstone of Webfleet’ commitment to information security is our set of security policies and programs. Based on our rigorous risk management program our policy aligns security with operations across the following topics:

Information Security Policies

A detailed set of security policies designed to provide management direction and support of the information management system and all operational activities with respect to the Webfleet Telematics Service Platform.

folders security
business meeting 01

Organi­zation of Information Security

Information Security is everyone’s business. Employment of a full-time information security team to provide compliance and governance of our Information Security Management System (ISMS) based on the ISO/IEC 27001:2017 inter­na­tional standard in addition to the EU General Data Protection Regulation (GDPR) and other relevant legis­la­tions. All of our employees and external partners play an integral part in supporting the ISMS.

Human Resources

Security in the employment life cycle is critical to ensure that security is emphasized prior, during, and after the termination of employment.

select partner 01
trucks front 01

Asset management

Inventory, ownership, and maintenance of all our assets throughout the life cycle is important to ensure that assets are categorized, labeled, and assigned risk owners to ensure that all assets including those with company IP or customer data are handled in a correct and secure way to maintain security.

Access Control

Through authen­ti­cation / autho­rization controls and identity management, all access is limited to a need-to-have basis. Additional controls assist to prevent unautho­rized access, for example system logging and monitoring which provides real-time detection across our security perimeter.

metallic turnstile gate
information security 03


We invest in state of the art hardware and software solutions including proven crypto­graphic technologies in order to protect the confi­den­tiality, integrity and avail­ability of our customer’s data as well as our operational systems.

Physical and Environ­mental Security

We place great value on ensuring physical and logical separation is maintained in the Webfleet Telematics Service Platform. This includes ensuring that the physical location in which information assets are located is protected from unautho­rized access and that equipment is protected from environ­mental conditions to prevent the failure of services for our customers.

safety camera 01
communication 01

Commu­ni­ca­tions Security

The protection of physical and virtual assets is critical to a secure telematics solution. This also includes maintaining a secure commu­ni­cation network and the facilities from which the network is hosted for secure transfer of the data between your vehicle and our Webfleet Telematics Service Platform back end.

Operational Security

Webfleet operates two independent data centers in the European Union due to the high level of data protection standards required. Our active / active config­u­ration also ensures the highest avail­ability including full disaster recovery.

  • Malware prevention
  • Monitoring
  • Vulner­a­bility / patch management
  • Penetration testing
  • Incident management
  • Network security
  • Secure off-site tape storage
  • System hardening
business people tablet 01

Systems Acquisition, Development & Maintenance

As a software company, all of our products depend on secure coding principles and processes to ensure an agile product life cycle.

1. Engineering

Software design analysis

2. Completed development

Static inspection of code

3. Quality assurance

Dynamic analysis of the application

4. Deployment

Deployment and stabil­isation of the application

The Webfleet Service Platform Life Cycle includes:

  • Peer reviewed design and coding
  • Style guidelines
  • QA / load testing
  • Release management
  • OWASP Top 10 and SANS Top 25 static code reviews

In addition, we facilitate the following programs to secure our engineering perimeter:

  • Security education for our engineering work force
  • Imple­men­ta­tion-level security testing and review
  • System hardening
  • Vulner­a­bility / Patch management
  • Penetration testing

Supplier Relation­ships

Securing the external risks at the edge of our scope helps to ensure that no additional risk is added to the organi­zation through our partners or suppliers. When possible, we select suppliers who are ISO/IEC 27001:2017 certified, as well as actively monitor our suppliers in order to maintain a secure working relationship and to be aware of changes to their environ­ments which could affect our secure operations.

transport logistics
physical data security 01

Information Security Incident Management

Should a security incident occur, it is important to have an effective approach for managing the incident, which includes the commu­ni­cation to all interested parties, as well as the internal reporting of security weaknesses which helps support a secure perimeter.

Information Security Aspects of Business Continuity Management

We manage a detailed Business and Information Security Continuity program to ensure that the Webfleet Telematics Service Platform will be available to our customers even in the event of a disaster. Through our Active/Active data center config­u­ration, the probability of a major disaster in both centers is unlikely, as each center can maintain our entire operation if necessary, which means you can rely on the Webfleet Telematics Service Platform service being available when you need it.

information security 01

Compliance and Data Privacy

Webfleet utilizes a full time Data Protection Officer (DPO) to advise on data protection matters and oversee compliance with the GDPR as well as other relevant local privacy legis­la­tions.
Our ISMS Security team performs regular reviews of legal or security require­ments which might have an effect on the Webfleet Telematics Service Platform or our information security management system.

Maximum security and integrity

Your data is in safe hands with our ISO/IEC 27001:2017-certified system.

Data deletion

Data is marked as deref­er­enced and overwritten in the event of data deletion to prevent the data from being accessible to any other parties.

Choose integrity. Protect the environment.

We do our part to provide you a secure platform, which allows you to save costs while doing your part for the environment.

Protecting driver privacy

With our focus on data protection, Webfleet has worked together with privacy groups and work councils to demonstrate our commitment to your privacy.

Data retention

Per default, Webfleet retains all detailed data including precise data tracks for up to ninety (90) days, and current year plus previous two (2) years for our logbook, dashboard, and reporting. This may differ due to specific country related regulations.

Your consent is required

In this section, external content is being embedded from .

To display the content, your consent is required for the following cookie categories:

  • Targeted Advertising
  • Analytics
  • Person­al­ization
  • Essential

For further details, please refer to our privacy policy. If you are interested in how ###vendor_name### processes your data, please visit their privacy policy.