Fleet management solutions
Vehicle TrackingTrack your trucks, vans, cars, trailers and assets with GPS tracking
Fleet safety and maintenanceEnhance safety with driver coaching, AI dashcam, digitised vehicle check, TPMS and scheduled maintenance
Workflow managementBoost productivity via professional navigation, route optimisation and order management
ComplianceTrack driver's hours, vehicle inspection, and coldchain management
Sustain­ab­ility and electric vehiclesReduce CO2 with green driving, electri­fic­ation advice and EV optimisation
Business admin­is­trationSave time on reporting, working time registration and driver identi­fic­ation
Platform and apps
Webfleet platformSaaS solution to connect you, your driver and your vehicles
Mobile apps NewA full suite of on-the-go applications
In-vehicle
Vehicle tracking devicesTrack your vehicles and gain insights with LINK series
Driver Terminals NewNavigate, communicate and report your operation with PRO driver terminal series
Fleet dash camsProtect your fleet and drivers while reducing claims with Webfleet Video telematics.
Tyre monitoring NewReact fast and eliminate downtime with TPMS
Integrations
Business integrationBy Webfleet and third-party solutions
Resources
ResourcesExplore our extensive range of whitepapers, case studies, webinars, videos and more
White papersTake a deep dive into the hottest and most important topics facing your industry with our in-depth reports
Case studiesWhat does Webfleet do for a business like yours? Find out what our customers have to say
GlossaryAll the fleet management lingo explained in our comprehensive glossary

Security and Privacy Vulnerability management

device securitydevice securitydevice securitydevice securitydevice securitydevice security

What is vulnerability management?

Vulnerability management is an ongoing process of identifying, evaluating, remediating, verifying and reporting vulner­ab­il­ities in systems and software. Vulnerability management can include issues with the underlying code as well as config­ur­a­tions pertaining to permissions and network capabilities. The aim of vulnerability management is to identify and remediate known vulner­ab­il­ities and apply security actions within a defined time objective.

Why is vulnerability management important?

Utilising vulnerability management helps meet laws, regulations, and compliance standards. These may include such regulations as the General Data Protection Regulation (GDPR) for personal information collected during customer interactions, and similar regulations. It helps avoiding exposure to leaks and breaches.

How do I report a vulnerability to Webfleet?

If you believe you have discovered a security or privacy vulnerability that affects Webfleet systems or services, please report it to us. We welcome reports from everyone, including security researchers, developers, and customers.

To report a security or privacy vulnerability, please send an email to DigitalTrust@webfleet.com that includes:

  • The specific product and software version(s) which you believe are affected.
  • Description of the behaviour observed as well as the behaviour that you expected.
  • A list of steps required to reproduce the issue and a video, if the steps may be hard to follow.

For the protection of our customers, Webfleet doesn't disclose, discuss, or confirm security issues until our investigation is complete and any necessary updates are generally available.

Webfleet commitment to vulnerability management?

Webfleet commits to resolve security vulner­ab­il­ities and release patches typically within 90 days to support systems or services, for a period of one calendar year from the end-of-sales date (Note: The end-of-sales date is when Webfleet announces to stop selling the product).

Product (Model)Period for security updates
PRO X (N727)Q1 2028

Your consent is required

In this section, external content is being embedded from .

To display the content, your consent is required for the following cookie categories:

  • Targeted Advertising
  • Analytics & Person­al­iz­ation
  • Essential

For further details, please refer to our privacy policy. If you are interested in how ###vendor_name### processes your data, please visit their privacy policy.