To best serve our enterprise customers, IoT security has always been DIGIMONDO's top priority.
This core drive to be secure results in product development practices that:
For our solutions and delivery this means:
Never over empower a user or device beyond its necessity.
Leverage API layers to protect and guard systems of record along with their system credentials.
Create and implement the auth model that matches the needs of the solution.
Enterprises need solutions that are flexible beyond clouds and across their internal infrastructure. DIGIMONDO recognized this and built a flexible deployment architecture from the ground up. The flexibility of the architecture unique to DIGIMONDO is best summarized by:
DIGIMONDO enforces a token based authentication model for both authenticated and anonymous interactions. This means that every interaction in the system requires a device and user to gain a valid token.
This token model enables:
DIGIMONDO provides a role based authority model for granting privileges. The ability to allow only specific actors, whether a device or user, to access each granular element of a system.
This means you can design specific control limits or expand who can perform actions such as:
Which devices can send messages.
What users are able to read a data collection.
Which administrators can update user information.
Recognizing the potential for emerging threats, DIGIMONDO has made IoT system awareness core to its offering. Security is always evolving and while building the best solution upfront is desired, there are often attempts at intrusion and abuse of your IoT system. With DIGIMONDO you have the:
By encrypting your data you can be sure that no matter what server it resides on or what network infrastructure it travels over, the secured data can not be read by prying eyes.
DIGIMONDO leverages the community best practices to ensure that data is encrypted during: