Security and IIoT

Version 1.1

Security

Version 1.1

 

Security measures at our server provider and server setup

1. HTTPS protection

To ensure secure communication, all data transmission between the user's devices and our platform is protected with HTTPS (Hypertext Transfer Protocol Secure). This means that all data is encrypted, preventing unauthorized access and interception of sensitive information.

2. Logging and storage

We keep extensive logs of all user queries and interactions with our platform. These logs are retained for 14 days, which helps us track and analyze user activity, troubleshoot issues, and investigate security incidents.

3. Investigation of abnormal traffic

Our security team constantly monitors traffic on our platform. When detecting abnormal or suspicious activity, our automated systems trigger alerts and our experts respond immediately.

4. Private Network Access

All databases and storage systems operate in a private network and are only accessible to the necessary servers, ensuring protection against unauthorized access.

5. Daily backups with external storage

We ensure data integrity by taking daily backups, which are encrypted and stored in multiple geographically separated data centers to guarantee data availability during unforeseen events.

6. SSL encryption of data transmission

All communication between our storage servers, including backups, is secured with SSL (Secure Sockets Layer) encryption, preventing eavesdropping during transfer.

7. Protection against brute-force and DDoS attacks

We employ advanced security measures to prevent brute-force and DDoS attacks by analyzing traffic, limiting access speeds, and implementing effective access controls.

 

Security measures at our telecommunications provider

1. Network security

Our telecommunications provider uses comprehensive network security measures such as firewall configurations, intrusion detection and prevention systems (IDS/IPS).

2. Data encryption

All data sent between services and user devices is protected with encryption protocols such as TLS (Transport Layer Security).

3. Access control

To prevent unauthorized access, our provider uses strict access controls, including user authentication, rights management, and constant monitoring.

4. Redundancy and high availability

The provider has redundant systems and data centers to ensure high uptime, even in the event of hardware failures or other unforeseen events.

5. Handling security incidents

Our telecommunications provider has a well-defined process for quickly identifying and remediating security incidents.

6. Compliance with legislation

The provider ensures compliance with relevant security and data protection regulations to guarantee the lawful processing of user data.

7. Penetration tests

Regular penetration tests are conducted to discover and close security holes before they can be exploited by malicious actors.

Security measures in GSMCLOUD hardware

 

1. Hardware stability

Our hardware automatically restarts if the connection is lost or if data is not received within the correct time frame, ensuring maximum uptime.

2. Automatic search for new provider

If there is no connection to the preferred provider, the hardware automatically searches for a new connection to ensure faster reconnection.

3. Secure VPN connection

Data from our hardware is protected by a VPN tunnel via OpenVPN, ensuring that data cannot be intercepted, copied or redirected.

4. Checksum on protocols

All data is validated with checksums to ensure it arrives correctly and without errors.

5. Power failure notification

Our hardware immediately sends an alert to the server in the event of a power failure, so the system is always up to date on the device's status.

6. Input monitoring

The hardware sends multiple short pulses per second to the input to ensure accurate status detection.