Telematics companies generate and process a huge amount of data every day. If the data is accessed by malicious parties, there could be serious consequences. We know that protecting that data is essential and that’s why we take security very seriously. But security involves a lot more than just protecting data. Let us explain how we secure our telematics infrastructure.
The security of our telematics infrastructure is divided into the following components:
- In-vehicle and device security
- Cloud platform security
- Cellular network security
- Data center protection
- Legal protection
In-vehicle & device security
The in-vehicle security is a combination of protective features. First thing is that we seal all connections and plugs when we install our devices. If, in any case, a connection is broken, the device will send an alert to our platform immediately since the device has an internal backup battery to continue operation even if the power is cut.
Another important in-vehicle security feature is that we connect devices in such a way that it is not possible to interfere with the vehicle systems and data busses. Our devices only use industry standards and indirect connections so it’s only possible to read data instead of writing data.
Next to physical security features, our telematics hardware contains a rich set of security features to prevent malicious access or control. Learn more about our hardware security here.
Cloud platform security
Our cloud platform is secured by industry standards like HTTPS, TLS1.3, DNSSEC and OAuth 2.0. For systems access, we work by the ISO27001 standards.
Platform administrators on the user side are in control when it comes to grant or prevent access to users, set permissions and force users to use high-security standards like password strength and duration.
Of course, our platform is compliant with the General Data Protection Act (GDPR).
Cellular network security
All data transferred from and to our devices is sent through our own virtual private network (VPN). This is far more secure than using the public network.
As an extra security feature, all data is encrypted end-to-end.
Data center security
Our partner, Amazon Web Services (AWS) provides exceptional levels of protection. Read more about the AWS security here.
Our main data center is located in Frankfurt, but all servers are located in three geographically disparate locations within the EU. Any failure results in a fully automatic move to an alternative center without disrupting the service. The data centers we use are anonymous, with no external identification, and have physical security in place 24/7.
Last but not least is our legal protection. Most important information about our terms and compliance with the GDPR can be found here.
Extra Protection: Escrow
As an extra layer of security, we’ve set up Escrow to protect our customers even if our company is in a state of bankruptcy. With Escrow, you’re 100% sure that our service will continue and that your data will remain safe and protected.