Security and IIoT

Version 1.1

Safety and security

Version 1.1

 

Security measures at our server provider and server setup

1. HTTPS protection

To ensure secure communication, all data transfer between the user's devices and our platform is protected with HTTPS (Hypertext Transfer Protocol Secure). This means that all data is encrypted, preventing unauthorised access and interception of sensitive information.

2. Logging and storage

We keep comprehensive logs of all user requests and interactions with our platform. These logs are kept for 14 days, which helps us track and analyse user activity, troubleshoot issues and investigate security incidents.

3. Investigating abnormal traffic

Our security team constantly monitors traffic on our platform. When abnormal or suspicious activity is detected, our automated systems trigger alerts and our experts respond immediately.

4. Private network access

All databases and storage systems operate in a private network and are only accessible to the necessary servers. This ensures protection against unauthorised access.

5. Daily backups with external storage

We ensure data integrity by taking daily backups that are encrypted and stored in multiple geographically separated data centres to guarantee data availability during unforeseen incidents.

6. SSL encryption of data transfer

All communication between our storage servers, including backups, is secured with SSL (Secure Sockets Layer) encryption, preventing eavesdropping during transfer.

7. Protection against brute-force and DDoS attacks

We use advanced security measures to prevent brute-force attacks and DDoS attacks by analysing traffic, limiting access speeds and implementing effective access controls.

 

Security measures at our telecommunication provider

1. Network security

Our telecoms provider uses comprehensive network security measures such as firewall configurations, intrusion detection and prevention systems (IDS/IPS).

2. Data encryption

All data sent between services and the user's devices is protected with encryption protocols such as TLS (Transport Layer Security).

3. Access control

To prevent unauthorised access, our provider uses strict access controls, including user authentication, rights management and constant monitoring.

4. Redundancy and high availability

The provider has redundant systems and data centres to ensure high uptime, even in the event of hardware failure or other unforeseen incidents.

5. Handling security incidents

Our telecoms provider has a well-defined process for rapid identification and remediation of security incidents.

6. Compliance with legislation

The Provider ensures compliance with relevant security and data protection regulations to guarantee the lawful processing of user data.

7 Penetration tests

Regular penetration tests are conducted to detect and close security gaps before they can be exploited by malicious actors.

Security measures in GSMCLOUD hardware

 

1. Hardware stability

Our hardware automatically reboots if the connection is lost or data is not received within the correct time frame, ensuring maximum uptime.

2. Automatic search for a new provider

If there is no connection to the preferred provider, the hardware will automatically search for a new connection to ensure faster reconnection.

3. Secure VPN connection

Data from our hardware is protected by a VPN tunnel via OpenVPN, ensuring that data cannot be intercepted, copied or redirected.

4. Checksums on protocols

All data is validated with checksums to ensure it arrives correctly and without errors.

5. Power failure notification

Our hardware immediately sends an alert to the server in the event of a power failure, so the system is always updated on the status of the device.

6. Input monitoring

The hardware sends several short pulses per second to the input to ensure accurate status detection.