Our Security Principles

We bake these into our architecture

The Client Owns their Data

Devices Require Software to Manage Sensors and Actuators

Devices Must Always Initiate the Connection to the Internet and Must Not Accept Inbound Connections

Devices Must Have the Ability to be securely Remotely Controlled in Real Time

Each & Every Device Must be Uniquely Identified and Authenticated in a Secure, Reliable and Scalable Manner

Cloud Platforms Must Comply with Client Data and Security Policies

All Actions Must be Logged by the Cloud