Information Security

edit-deleteThe security of the Redshift Wireless Ecosystem is very important to us – and we have designed the system from the ground up to be as secure as possible. As we were designing the system, we were constantly reading about attacks on Industrial Control, and the potential impact this was having on organizations. With this in mind, we flipped the problem on it’s head. Rather than having a point of attack at every location where our equipment is used, we have reduced the footprint significantly.

The way we do this is to ensure that the equipment installed in customer premises does not have people connecting to it. The system works by having each device initiate an outgoing connection to our servers. We can then send information back, but any information needs to be properly formatted and will only be accepted if it comes from us. Simply using outgoing connections reduces most of the security risk. Of course, this means that we need to protect our servers, but the effort required to protect a handful of servers with full time staff is significantly lower than the effort required to protect thousands of servers spread throughout the world.

Our core product lines are also designed with minimal memory and computing power making the entire system even more secure.

The one exception to all this is our Redshift Climate Extreme Edition. This product has an administration interface that is active dependent on the mode. The product is secure and operates the same way as our other products, but is designed to live behind a firewall, or NAT gateway. This will be the majority of installs anyway.

If you have any questions, or concerns, about security, please contact us. We will tell you as much as we can, but please bear in mind that certain security technology we use is propriety in order to protect our systems.

Top