Factors of Security

Data Protection and Data Security for Your Platform Solution

The security of your building and your data is our basic premise. Our cloud platform and all add-ons are designed, planned and implemented from the ground up according to the security-by-design principle. With redundant security mechanisms, we ensure the greatest possible security for your platform and your data.

Security Features

Gesicherter Serverschrank

Certified Data Centers

The hosting of our entire applications of our platform is carried out by dedicated machines in certified data centers (according to ISO, IEC 27001).

Hosted in Germany

Our services are hosted exclusively in Germany. The data centers used for hosting are extensivley certified, feature DDoS-protection and multi-redundant connection.

Redundant Backups

All recorded data is saved automatically, multi-redundantly and seperated locally in certified data centers. We make sure that your work is available and accessible in emergent cases.

Encapsulation & Separation

The entire services and data are consistently encapsulated and seperated - right down to system level. Consequently users and functions only have the limited access they actually require.

Encrypted Data Transfer

The data is transferred from the plant to our servers with state-of-the-art encryption. We use the sophisticated and validated protocol of TLS 1.2.

Role-based Access Control

The access management allows as many roles with individual access rights as you wish, from just a single data point up to a company-wide project overview.

Security from the Very Beginning

Against the backdrop of increasing networking and the steady development of the Internet of Things, high security requirements are necessary for hardware and software. In the case of our cloud platform, we have already been guided by the principle of "security by design" in the planning and conception phase and have given particular weight to the issue of security in the initial development phase.

You can find more information about our information security policies in our open documentation.


Documentation