IT & DATA SECURITY
Your data contains information that is sensitive to your business. You have full authority over all data generated by DIAP at your production site. Your data is yours and will stay yours.
End-to-end data security
Multi-level information security
DIAP is equipped with multi-level information security to ensure that the collected data is protected in the best possible way.
Highest security standards available
We have secured every element of the DIAP data flow with the highest security standards available for an end-to-end security.
Restricted user privileges
The system has restricted user privileges. Users are grouped as full access administrators or restricted access operators. Each user has a unique password with two-factor authentication.
Secure the future of your production
Please contact us to learn how DIAP can future-proof your production securely.
Send us an email
Click on the brochure to learn more about DIAP
Fighting risks proactively
Industry 4.0 paves the way for interconnectedness at a previously unseen level. This lets you gain insight into your manufacturing processes, but it also makes the risk of cyber-attacks more imminent than ever. We believe in a proactive approach to fighting the latest security threats. You will frequently receive system updates to ensure that your DIAP infrastructure meets the highest security requirements.
Secure cloud storage
Your collected data is transported securely from the DIAP gateway to a cloud database for safe storage. DIAP uses Microsoft Azure to ensure maximum protection of your data. All DIAP users are provided with a unique password.
We perform secure, regular updates of the software suite to protect against the latest threats.
Local protection
- The latest Linux security features incl. extended DAC
- A key management subsystem for managing cryptographic keys within the kernel
Features
- Complete infrastructure: SQL database, website and IoT hub
Communication
- Highest security standards
- Secure connection: TLS 1.2 and RSA with HMAC-SHA256 symmetric keys and signature
- VPN or cloud access
Would you like to know about our approach to data security
Please contact me if you have any questions about the protection of your valuable production data.
Send me an email
Jens Rosenkilde
Sales Manager
