TrustSecurity is first-class

Security is built into everything we do

Our customers depend on PackGuru for operational reliability — and that starts with protecting their data at every step. Security and privacy are first-class engineering concerns, not afterthoughts

01 /Governance

Four principles, applied across the company

  • Least Privilege AccessAccess is limited to legitimate business necessity — minimum scope, minimum duration, fully audited
  • Defense in DepthLayered, multi-faceted controls so no single failure exposes a system
  • Consistent ControlsUniform application across the enterprise — engineering, operations, customer success, partners
  • Continuous ImprovementIterative maturation of controls. Audit findings turn into engineering tickets the same week
02 /Compliance status

Frameworks and reports

PackGuru maintains SOC 2 compliance and aligns with ISO 27001, GDPR and CCPA. Reports and bridge letters are available under NDA on request

SOC 2

Report available upon request. Bridge letter for ongoing procurement reviews between attestation periods

ISO 27001

Architecture and information-security management aligned to the standard

GDPR

Data Processing Addendum (DPA) available. EU data residency option

CCPA

Consumer-rights handling aligned to California Consumer Privacy Act requirements

ISA/IEC 62443

Industrial cybersecurity standard alignment for the OT side of every deployment

Penetration testing

Independent specialists conduct recurring assessments of applications and infrastructure

Architecture

Your PLCs never talk to the internet

Zero inbound ports
PackGuru connects to your machines without opening a single inbound port
One-way data flow
Information leaves the factory through a secure DMZ bridge
Encrypted everywhere
All data over TLS 1.2+ on standard port 443. No custom firewall rules
Audit-ready
ISA/IEC 62443, SOC 2, GDPR. ISO 27001 on the roadmap
03 /Data privacy

A first-class priority

PackGuru is committed to being a trustworthy steward of all sensitive data — operator information, factory telemetry, customer business context. The platform is designed to capture what the line does, not what the person does. Login attribution is configurable per deployment, and operator-level monitoring is opt-in

Download the security pack

Send us your CISO's email. We'll forward SOC 2 (NDA), the ISA architecture document and book a 30-minute technical review