googleplus linkedin twitter facebook circle-right icon-circle-left circle-down reliability started icon-status doc library api forum superpowers spaceship global edge comm solutions business trustshield lightbulb hardwarelarge porting applications hardware api2 libraryapi secure opensource portable < path class="cls-1" d="M2022.62,683.81a1.39,1.39,0,1,1,1.39-1.39A1.39,1.39,0,0,1,2022.62,683.81Zm0-1.5a0.11,0.11,0,0,0-.11.11c0,0.12.21,0.12,0.21,0A0.11,0.11,0,0,0,2022.62,682.31Z" transform="translate(-2008.95 -661.67)" /> secure devcommunity lightning clock discoveraccess scalable solutionsadmin solutionsmonitoring datadiscovery resourceusage analyticstool webbuilder mobilebuilder dashbuilder datastorage identity analyticsengine devicemanagement devlibrary secureconnections openaccess hosting federated builder gateway devicecloud embeddedsdk marketplace securitymanagement calendar eye create-manage-icon certifiedquality usagebilling accesscontrol exositereadylogolg connectedproduct connectedsolution connectedbusines comingsoon homeresourcesdeveloper homeresourceswhitepaper homeresourcescasestudy


Exosite complies with leading security frameworks, employing bank-level SSL encryption on all sensitive interfaces of the platform. API end points communicate through secure socket layers (SSL/TLS) to prevent eavesdropping, tampering, or message forgery. User interfaces and web applications use HTTPS-encrypted communication to protect the privacy and integrity of data exchange.



A hierarchical security model strictly enforces security policies for data storage and retrieval. Physical access to data servers is restricted, and facilities hosting the platform have on-site monitoring, multi-factor authentication, and security logging for added protection. Access to customer data is strictly controlled. Every request is authenticated, and access is isolated to the customer-specific data set.


User authentication tightly controls who has access to the platform. Permissions are layered, making it easy to grant multiple degrees of access to information or pass temporary API keys based on user-level permissions. Sensitive customer information, passwords, and tokens are securely stored.


Exosite ensures data is never exchanged between the platform and end points without authorization. All Exosite-powered devices use a private key to interact with the platform for secure data exchange. To reduce the risk of spoofing during set up, devices in the field have a controlled time-window to authenticate themselves with the platform over encrypted API communications (DTLS, TLS). Once a device is fully authenticated, its ownership and hierarchy are established.

Download White Paper

Security in
IoT Systems

As a global leader in IoT, Exosite has thoroughly examined the security challenges posed by connected devices and developed a world-class IoT security foundation to address them.

Send Us a Question

Sales Product Support

Call our Sales Team