Your data contains information that is sensitive to your business. You have full authority over all data generated by DIAP at your production site. Your data is yours and will stay yours.

End-to-end data security

Multi-level information security

DIAP is equipped with multi-level information security to ensure that the collected data is protected in the best possible way.


Highest security standards available

We have secured every element of the DIAP data flow with the highest security standards available for an end-to-end security.


Restricted user privileges

The system has restricted user privileges. Users are grouped as full access administrators or restricted access operators. Each user has a unique password with two-factor authentication.

Secure the future of your production

Please contact us to learn how DIAP can future-proof your production securely.

Send us an email

Click on the brochure to learn more about DIAP

Fighting risks proactively

Industry 4.0 paves the way for interconnectedness at a previously unseen level. This lets you gain insight into your manufacturing processes, but it also makes the risk of cyber-attacks more imminent than ever. We believe in a proactive approach to fighting the latest security threats. You will frequently receive system updates to ensure that your DIAP infrastructure meets the highest security requirements.

Secure cloud storage

Your collected data is transported securely from the DIAP gateway to a cloud database for safe storage. DIAP uses Microsoft Azure to ensure maximum protection of your data. All DIAP users are provided with a unique password.

We perform secure, regular updates of the software suite to protect against the latest threats.

Local protection

  • The latest Linux security features incl. extended DAC
  • A key management subsystem for managing cryptographic keys within the kernel


  • Complete infrastructure: SQL database, website and IoT hub


  • Highest security standards
  • Secure connection: TLS 1.2 and RSA with HMAC-SHA256 symmetric keys and signature
  • VPN or cloud access

Would you like to know about our approach to data security

Please contact me if you have any questions about the protection of your valuable production data.

Send me an email

Jens Rosenkilde

Sales Manager