At Intellobots, security is not an afterthought; it is the foundation of our ThingsX platform. We
understand that our customers rely on us to digitize, connect, and automate their most critical physical
operations. We are committed to maintaining the highest standards of security, availability, and
confidentiality.
1. Secure Infrastructure
Our platform is built on world-class cloud infrastructure providers (AWS/GCP/Azure) that maintain
industry-leading physical and environmental security controls. We employ a multi-layered approach to
infrastructure security:
- Network Security: We use Virtual Private Clouds (VPCs), firewalls, and network
segregation to isolate services and protect data.
- DDoS Protection: Automated mitigation systems are in place to detect and block
distributed denial-of-service attacks.
- Intrusion Detection: Continuous monitoring systems alert our security team to
potential threats in real-time.
2. Data Encryption
We protect your data throughout its lifecycle:
- Encryption in Transit: All data transmitted between your devices, our edge nodes,
and our cloud platform is encrypted using TLS 1.2 or higher.
- Encryption at Rest: Data stored in our databases, backups, and file systems is
encrypted using industry-standard AES-256 encryption.
- Key Management: We use secure key management services to generate, store, and
rotate encryption keys.
3. Access Control & Authentication
We implement strict access controls to ensure that only authorized personnel and systems can access data:
- Role-Based Access Control (RBAC): Granular permissions ensure that users only have
access to the resources they need.
- Multi-Factor Authentication (MFA): MFA is enforced for all administrative access to
our production systems.
- Principle of Least Privilege: We strictly adhere to the principle of least
privilege for all internal access.
4. Application Security
Our engineering team follows secure coding practices and integrates security into the development
lifecycle:
- Regular Security Reviews: Code is reviewed for security vulnerabilities before
deployment.
- Vulnerability Scanning: We perform regular automated scans of our applications and
infrastructure to identify and patch vulnerabilities.
- Penetration Testing: We engage third-party security firms to conduct periodic
penetration testing of our platform.
5. Operational Security
We maintain rigorous operational security protocols to ensure the continuous protection of our platform
and your data:
- Continuous Monitoring: We use security information and event management (SIEM)
tools to monitor for anomalies 24/7.
- Logging & Auditing: All critical system actions are logged and audited to provide a
clear trail for security investigations.
- Thorough Background Checks: All employees with access to production systems undergo
background checks.
6. Backup & Disaster Recovery
We ensure data availability and business continuity through:
- Automated Backups: Mission-critical data is backed up daily and stored in multiple
geographically diverse locations.
- Point-in-Time Recovery: We maintain the ability to restore data to specific points
in time in case of accidental loss or corruption.
- Regular Disaster Drills: We conduct periodic walkthroughs of our disaster recovery
plans to ensure rapid restoration of services.
7. Device Security
For IoT deployments, we ensure end-to-end security:
- Device Authentication: Every device connecting to the ThingsX platform is
authenticated using X.509 certificates or secure tokens.
- Secure Updates: Over-the-air (OTA) updates are signed and verified to prevent
malicious firmware injection.
- Edge Isolation: Edge computing nodes are isolated from the core network to contain
potential breaches.
8. Compliance
We are committed to complying with relevant data protection regulations and standards:
- GDPR: We are compliant with the General Data Protection Regulation (GDPR) for data
privacy.
- SOC 2 Type II: (In Progress) We are working towards SOC 2 Type II certification to
demonstrate our ongoing commitment to security and operational excellence.
9. Security Reporting
If you believe you have found a security vulnerability in our platform, please report it to our security
team immediately at info@intellobots.com. We will investigate all reports
and work with you to resolve valid issues efficiently.
Last Updated: February 18, 2026