1. Add to Cart

Tap ADD TO CART
button below

2. Checkout

Complete the checkout
to receive your detailed report

3. Get Contacted

Follow instruction from salesperson to upload your spend data

Enterprise spend management free report

Preview your company analytics to maximize your company’s potential to operate at peak efficiency.

$0.00

Security

EPISHIP does not share, sell, rent, or trade your information with third parties.

Let's Talk

Talk with our team to get an outlook on the report of findings.

(833) 364-0070

FAQs

Learn more about the analysis, including the different checks performed in the analysis.

VIEW FAQ

Answers to common questions.

Visit epiship.com/track to view your shipment’s most recent tracking events.

Shipments are scanned at different points between pickup and delivery. The scan frequency varies, and it is not unusual for a shipment to go more than a day without an update. Your shipment can be in transit to the next location where it will be scanned and/or delivered, but it may appear that your shipment isn’t moving.

A delivery exception means your package is temporarily delayed while in transit. Possible reasons include inclement weather, a natural disaster, or a delivery vehicle issue. We work hard to deliver every package as soon as possible, so a delivery exception doesn’t necessarily mean that your shipment will arrive late.

To find your rate, 
1. Determine billable weight.
2. Find the zone.
3. Find your rate.
4. Add additional charges.
Visit https://epiship.com/rates for more info.

Visit epiship.com/prohibited-and-restricted-items/ for a list of restricted and prohibited items.

Once a shipment has been picked up by the carrier, any change you wish to make to the shipment must be done directly with that carrier.

We hold security to the highest regard. All software and supporting resources are implemented using best practices in application development for building highly-scalable, highly-available, highly-secure cloud-based applications. The information below details the security standards and procedures used to protect your information within the application.

Data Encryption. Bidirectional encryption of communications between our system and external endpoints, including web services and client devices are executed over HTTPS protocol using TLS 1.2. This validates authentication and protects against man-in-the-middle attacks, eavesdropping or tampering with the information related to your account.

SSL certification is provided by Comodo using 256-bit encryption with support for 99.9% of browsers and devices.

Penetration Testing. Application penetration testing security audits have been performed by third-party service provider Cigital to demonstrate vulnerabilities and guidance on addressing vulnerabilities to improve application security.

Credit Card Storage and Processing. All credit card numbers are encrypted and stored within Stripe using AES-256 encryption. Stripe is certified to PCI Service Provider Level 1, the highest level of certification available. All information managed by Stripe is protected within the Stripe privacy and security policies and adheres to federal regulations.

Infrastructure Security. All web services are managed within Amazon Web Services (AWS). Cloud security at AWS is the highest priority. The standards and certifications listed below support the global infrastructure of Amazon’s cloud.

ISO 27001. ISO 27001 is the defacto international security standard that specifies security management best practices and compliance.

SAS 70 Type II Audit Completion. Independent auditors certified AWS resources with certification of operational performance and security in safeguarding customer data.

Monitoring and Logging. Internet traffic and resource utilization are analyzed using third-party software Amazon Inspector to identify potential application security issues. These resources are integrated into the DevOps processes to ensure that security standards and best practices are included with all application features and improvements.

Identity and Access Control. User identities and related access permissions are managed within defined user roles. Invocation and revocation of access permissions is automated and specific to the role granted to each user. User identities are validated using an access policy related to the defined role of a user. The Identify Access Management Service provided by AWS is used to manage identity and access controls.

EPISHIP integrates well with many different applications. Contact Us for any specific app integration questions you many have.

The consignee is mandated to approve the ‘Authorized Courier’ and/or the ‘Customs Broker’ (CB) to set a customs clearance in motion including filing of the bill of entry and the mandatory clearance paperwork. This approval will allow EPISHIP to act as your approved courier and/or CB to process your shipment with customs. You can decide to employ your own customs broker by leaving instructions to EPISHIP at least 24 hours before arrival for a formal entry or cargo shipments entry only. As an alternative, you may ship using EPISHIP International Priority-Broker Select Option (BSO).

Visit epiship.com/contact to directly contact EPISHIP for more information.