googlepluslinkedintwitterfacebookcircle-righticon-circle-leftcircle-downreliabilitystartedicon-statusdoclibraryapiforumsuperpowersspaceshipglobaledgecommsolutionsbusinesstrustshieldlightbulbhardwarelargeportingapplicationshardwareapi2libraryapisecureopensourceportable< path class="cls-1" d="M2022.62,683.81a1.39,1.39,0,1,1,1.39-1.39A1.39,1.39,0,0,1,2022.62,683.81Zm0-1.5a0.11,0.11,0,0,0-.11.11c0,0.12.21,0.12,0.21,0A0.11,0.11,0,0,0,2022.62,682.31Z" transform="translate(-2008.95 -661.67)" />securedevcommunitylightningclockdiscoveraccessscalablesolutionsadminsolutionsmonitoringdatadiscoveryresourceusageanalyticstoolwebbuildermobilebuilderdashbuilderdatastorageidentityanalyticsenginedevicemanagementdevlibrarysecureconnectionsopenaccesshostingfederatedbuildergatewaydevicecloudembeddedsdkmarketplacesecuritymanagementcalendareyecreate-manage-iconcertifiedqualityusagebillingaccesscontrolexositereadylogolgconnectedproductconnectedsolutionconnectedbusinescomingsoonhomeresourcesdeveloperhomeresourceswhitepaperhomeresourcescasestudy

MULTI-LAYERED DEFENSE

Exosite complies with leading security frameworks, employing bank-level SSL encryption on all sensitive interfaces of the platform. API end points communicate through secure socket layers (SSL/TLS) to prevent eavesdropping, tampering, or message forgery. User interfaces and web applications use HTTPS-encrypted communication to protect the privacy and integrity of data exchange.

DOWNLOAD EXOSITE'S SECURITY WHITE PAPER

DATA
STORAGE

A hierarchical security model strictly enforces security policies for data storage and retrieval. Physical access to data servers is restricted, and facilities hosting the platform have on-site monitoring, multi-factor authentication, and security logging for added protection. Access to customer data is strictly controlled. Every request is authenticated, and access is isolated to the customer-specific data set.

USER AUTHENTICATION

User authentication tightly controls who has access to the platform. Permissions are layered, making it easy to grant multiple degrees of access to information or pass temporary API keys based on user-level permissions. Sensitive customer information, passwords, and tokens are securely stored.

DEVICE AUTHENTICATION

Exosite ensures data is never exchanged between the platform and end points without authorization. All Exosite-powered devices use a private key to interact with the platform for secure data exchange. To reduce the risk of spoofing during set up, devices in the field have a controlled time-window to authenticate themselves with the platform over encrypted API communications (DTLS, TLS). Once a device is fully authenticated, its ownership and hierarchy are established.

Download White Paper

Security in
IoT Systems

As a global leader in IoT, Exosite has thoroughly examined the security challenges posed by connected devices and developed a world-class IoT security foundation to address them.

Send Us a Question

SalesProduct Support

Call our Sales Team

612.353.2161