PROAKTIV SIKKERHED
24/7 overvågning af server og netværk
DRIFTSTATUS
Få driftsmeddelser pr. email
OEE LIVE MÅLINGER
Statusside med aktuelle oppetider
SECURITY BESKRIVELSE
Dokument om generel sikkerhed
PROAKTIV SIKKERHED
DRIFTSTATUS
OEE LIVE MÅLINGER
Eksempel på statusside:
To ensure secure communication, all data transmitted between end-user devices and our platform is enforced with HTTPS (Hypertext Transfer Protocol Secure). This means that any data exchanged is encrypted, preventing unauthorized access or eavesdropping on sensitive information.
We maintain comprehensive logs of all user requests and interactions with our platform. These logs are retained for a period of 14 days. This retention period helps us track and analyze user activity, troubleshoot issues, and investigate any security incidents or anomalies.
Our security team closely monitors the traffic on our platform. In the event of any abnormal or suspicious traffic patterns, our automated systems trigger alerts, and our experts investigate immediately. This proactive approach allows us to swiftly respond to potential security threats and take appropriate action.
All databases and storage systems used by our platform operate within a private network. They are isolated and only accessible from the specific servers that need to access them. This isolation helps prevent unauthorized access and reduces the attack surface.
We prioritize data integrity and resilience. To ensure this, we create daily backups of your data. These backups are not only stored securely but are also encrypted. Furthermore, we employ a multi-datacenter strategy, storing redundant copies of your data in separate geographically distributed datacenters. This approach guarantees data availability even in the face of unexpected events.
Any communication with our data storage servers, including backups, is protected with SSL (Secure Sockets Layer) encryption. This encryption ensures that data transferred between servers remains confidential and cannot be intercepted by malicious actors during transit.
We implement advanced security measures to protect against brute-force attacks, which involve repeated login attempts to gain unauthorized access. Additionally, our platform is designed to withstand Distributed Denial of Service (DDoS) attacks, which aim to overwhelm our resources. We use a combination of traffic analysis, rate limiting, and access controls to mitigate these threats and ensure the availability of our services.
Security Measures with the Telecommunications Provider:
Our telecommunications provider implements comprehensive network security measures to protect data and services. This includes firewall configurations, intrusion detection and prevention systems (IDS/IPS), and regular network scans to detect and respond to potential threats.
The telecommunications provider employs robust encryption to protect data during transmission and storage. Data sent between their services and user devices is safeguarded using encryption protocols such as TLS (Transport Layer Security).
To prevent unauthorized access to their systems and infrastructure, the telecommunications provider enforces strict access controls. This includes user and administrator authentication, user rights management, and continuous monitoring of access activity.
The telecommunications provider maintains redundant systems and data center facilities to ensure high availability of their services. This enables them to maintain services even in the event of hardware failures or unforeseen incidents.
The telecommunications provider has a well-defined incident handling process that activates in case of a security incident. This includes rapid incident identification, mitigation, and reporting, followed by analysis and improvements to security measures.
The telecommunications provider complies with relevant security and data protection standards and regulations to ensure that user data is processed and protected in accordance with legal requirements.
As part of their security practices, the telecommunications provider regularly conducts penetration testing, simulating attacks to identify vulnerabilities and address them before they can be exploited by malicious actors.
Security Measures with the GSMCLOUD hardware:
Our hardware automatically restarts if it loses connection to the network or if data is not received within the correct time frame. This ensures our customers that their alarms have the highest possible uptime.
If the hardware doesn’t have a connection to the preferred providers, it checks for new providers. If a stable connection is established with the new provider, the system will automatically favor this provider for faster future connections.
Data from our hardware is protected by a VPN tunnel provided through OpenVPN.
This ensures that your data is not intercepted, copied, or rerouted.
Data from our hardware uses a special checksum to ensure that the data arrives correctly.
This allows the system to detect errors in incoming data.
Our hardware sends a notification to the server in case of a power failure, ensuring that the server is always aware if the hardware loses power.
Our hardware sends multiple short pulses to the inputs per second to ensure that the input status is always accurate.
Få et tilbud eller rådgivning af vores specialist
Overvejer du et produkt fra GSMCLOUD? Få et uforpligtende tilbud.