Security Maximum protection of your fleet and data

Home » Technology » Security

The importance of security

Telematics companies generate and process a huge amount of data every day. If the data is accessed by malicious parties, there could be serious consequences. We know that protecting that data is essential and that’s why we take security very seriously. But security involves a lot more than just protecting data. Let us explain how we secure our telematics infrastructure.

Infrastructure overview

The security of our telematics infrastructure is divided into the following components:

 

  • In-vehicle and device security
  • Cloud platform security
  • Cellular network security
  • Data center protection
  • Legal protection

In-vehicle & device security

The in-vehicle security is a combination of protective features. First thing is that we seal all connections and plugs when we install our devices. If, in any case, a connection is broken, the device will send an alert to our platform immediately since the device has an internal backup battery to continue operation even if the power is cut.

Another important in-vehicle security feature is that we connect devices in such a way that it is not possible to interfere with the vehicle systems and data busses. Our devices only use industry standards and indirect connections so it’s only possible to read data instead of writing data.

Next to physical security features, our telematics hardware contains a rich set of security features to prevent malicious access or control. Learn more about our hardware security here.

Cloud platform security

Our cloud platform is secured by industry standards like HTTPS, TLS1.3, DNSSEC and OAuth 2.0. For systems access, we work by the ISO27001 standards.

Platform administrators on the user side are in control when it comes to grant or prevent access to users, set permissions and force users to use high-security standards like password strength and duration.

Of course, our platform is compliant with the General Data Protection Act (GDPR).

Cellular network security

All data transferred from and to our devices is sent through our own virtual private network (VPN). This is far more secure than using the public network.

As an extra security feature, all data is encrypted end-to-end.

Data center security

Our partner, Amazon Web Services (AWS) provides exceptional levels of protection. Read more about the AWS security here.

Our main data center is located in Frankfurt, but all servers are located in three geographically disparate locations within the EU. Any failure results in a fully automatic move to an alternative center without disrupting the service. The data centers we use are anonymous, with no external identification, and have physical security in place 24/7.

Legal protection

Last but not least is our legal protection. Most important information about our terms and compliance with the GDPR can be found here.

Extra Protection: Escrow

data escrow alliance logo

As an extra layer of security, we’ve set up Escrow to protect our customers even if our company is in a state of bankruptcy. With Escrow, you’re 100% sure that our service will continue and that your data will remain safe and protected.

Read more about Escrow.

Learn more about our technology

Cloud Platform

Learn more about our state of the art cloud platform.

Hardware

Get to know our smart telematics hardware device.

Security

Read more about the security of our infrastructure.