Engineered for Trust.

Security You Can Rely On, By Design.

At Neptune Software, security and compliance aren’t just checkboxes, they’re part of the architecture. From the way we build our platform to how we operate as a company, everything is designed to protect what matters most: your data, your users, and your peace of mind.
Security Hero Image

Trusted by SAP Experts and Industry Leaders

2
6
7
BALLANCE_WHITE
BECOUR_WHITE
BELL FOOD GROUP_WHITE
COLORIFICIO_WHITE
Coop
Daimler
DFO_WHITE
DISCOVERY_WHITE
DUCIT_WHITE
DUSSMANN GROUP_WHITE
EDA
Electrolux
ELKJOP_WHITE
EXXON_WHITE
Fendi
FONTERRA_WHITE
FORSVARET_WHITE
GENDARMERIE_WHITE
Halliburton
HAUNI_WHITE
HITACHI_WHITE
Bayer Logo
INFRASERV_WHITE
JOHNSON AND JOHNSON_WHITE
JOLLYROOM_WHITE
Nippon
NORSK GJENVINNING_WHITE
NZ CONSERVATION_WHITE
RUST-OLEUM_WHITE
NZ DEFENCE_WHITE
SAFRAN_WHITE
SECIL_WHITE
SOTHEBYS_WHITE
STATKRAFT_WHITE
UNITED UTILITIES_WHITE
US SUGAR_WHITE
VATTENFALL_WHITE
VODAFONE_WHITE (2)
Vodafone
WVV_WHITE
Hageland Logo
TC Energy Logo
Prio Energy Logo
PGE Logo
DEWA logo
PCK Logo
OGE logo
Hydro Tasmania logo
energieAG logo
2
6
7
BALLANCE_WHITE
BECOUR_WHITE
BELL FOOD GROUP_WHITE
COLORIFICIO_WHITE
Coop
Daimler
DFO_WHITE
DISCOVERY_WHITE
DUCIT_WHITE
DUSSMANN GROUP_WHITE
EDA
Electrolux
ELKJOP_WHITE
EXXON_WHITE
Fendi
FONTERRA_WHITE
FORSVARET_WHITE
GENDARMERIE_WHITE
Halliburton
HAUNI_WHITE
HITACHI_WHITE
Bayer Logo
INFRASERV_WHITE
JOHNSON AND JOHNSON_WHITE
JOLLYROOM_WHITE
Nippon
NORSK GJENVINNING_WHITE
NZ CONSERVATION_WHITE
RUST-OLEUM_WHITE
NZ DEFENCE_WHITE
SAFRAN_WHITE
SECIL_WHITE
SOTHEBYS_WHITE
STATKRAFT_WHITE
UNITED UTILITIES_WHITE
US SUGAR_WHITE
VATTENFALL_WHITE
VODAFONE_WHITE (2)
Vodafone
WVV_WHITE
Hageland Logo
TC Energy Logo
Prio Energy Logo
PGE Logo
DEWA logo
PCK Logo
OGE logo
Hydro Tasmania logo
energieAG logo
Built for trust and transparency

Our Commitment to Security and Compliance.

Certifications

Independent verification.

We are certified to ISO 27001:2022, the leading standard for Information Security Management, ensuring the confidentiality, integrity, and availability of information through the implementation of robust security controls and requirements.

Policy

Clear rules, daily practice.

Our Information Security Policy, aligned with ISO 27001:2022, defines how we manage information security risks, set security objectives, and ensure compliance with legal, regulatory, and business requirements.

Compliance Module

Privacy

Compliance by design.

As an EU-based company, we meet GDPR and global privacy requirements. Privacy is built in by design and by default, supported by Data Processing Agreements and our Privacy Policy.

Key security highlights

Built-In Protection.

Certified Security

ISO 27001:2022 verified for global standards.

GDPR Ready

Privacy by design, fully EU compliant.

Data Encryption

AES-256 at rest, TLS in transit.

Access Control

Need-to-Know Principle and multi-factor authentication.

Continuous Improvement

Continuous improvement approach, regularly monitoring and enhancing our Information Security Management System to address evolving risks and ensure ongoing effectiveness

Low-Code Platform

Build Enterprise Apps Fast,
Without Complexity.

Adopt, Evolve, and Own AI—On Your Terms.

Frequent
Asked Questions

Didn’t find what you need?

Neptune is ISO 27001:2022 certified. The Information Security Management System includes policies and procedures designed to systematically protect company information and assets based on their criticality and sensitivity, minimizing risks to acceptable levels. These policies are accessible to all employees, reviewed annually, and cover governance, risk management, human resources security, system and facility security, operations, incident management, business continuity, privacy, monitoring, and security testing.

Yes, the Information Security team is accountable for governance, risk management, compliance, serving as the second line of defence, overseeing the Management System, and managing the overall security and business continuity program.

Neptune Software has a well-established incident response capability that allows it to address incidents in a structured and systematic manner. It follows a rigorous incident management policy and procedures for events that may impact the confidentiality, integrity, or availability of systems or data, or that may constitute a breach of company policies and controls. Incidents are classified according to their severity and impact on customers and business operations

The personal information we collect is stored and/or processed in Norway, or where we or our partners, affiliates, and third-party providers maintain facilities.

Neptune Software assesses new third parties to ensure they adhere to its security, privacy, and business continuity standards and best practices.  Formal agreements are established, outlining responsibilities, information security incident management procedures, communication channels, and designated contacts for security and privacy matters (including incidents).  Neptune Software also performs ongoing due diligence based on the third-party risk level to verify that their commitment to information security, privacy, and business continuity remains strong over time. This evaluation may include reviewing audit reports, certifications (such as SOC2 and ISO), surveys, penetration testing results, and other relevant documentation.

Neptune Software has a Business Continuity Policy and a Business Continuity Plan in place for critical business functions, supported by a comprehensive business impact analysis and risk evaluation.

To report a security vulnerability, you can contact us through.

Yes, conformity with security standards and policies is regularly assessed through internal and external audits as part of our ISO 27001 certification. Authorized external parties conduct penetration tests to evaluate the security of our product, at least once a year.

Access to company information and systems is granted only as necessary to perform assigned job responsibilities. Neptune Software follows the principles of least privilege and need-to-know, along with segregation of duties, as key security measures. Resources are further protected through multi-factor authentication (MFA). Access is revoked on an employee’s last day of employment, and periodic access reviews are conducted.

Encryption plays a critical role in Neptune Software’s security strategy, following best practices for both data in transit and at rest. For data in transit, we utilize TLS 1.2 or TLS 1.3 protocols. Data at rest is protected with AES-256 encryption.