
Security by design
Trust is not a coincidence, but an architectural principle.
Security is more than a feature - it is the DNA of the hetida platform
Your IoT data is the lifeblood of your company. That’s why the hetida platform focuses on security by design: every component is designed from the ground up to be secure – from the backend to the frontend.
Row-Level-Security (RLS)
Each client lives in a strictly isolated data world. Not even fuseki has access to your raw data – the hierarchies, dashboards and IoT data remain under your sole control.
Identity Access Management (IAM)
Two-factor authentication (2FA) and single sign-on (SSO) ensure secure access and can be integrated into your existing infrastructure.
Always up-to-date
We only use the latest libraries and proactively fix security vulnerabilities – no update backlog
Zero Trust Principle
Only authorized devices and users are granted access – every communication channel is authenticated & authorized using the latest encryption algorithms.
Free choice of your operating environment
Hosting on premise or in the cloud
Operate the platform yourself or use our reliable cloud provider – the choice is yours! If you opt for the cloud option, your data will be hosted exclusively in German data centers – GDPR-compliant and traceable.
Complete roles and rights concept
In addition to the organizational structure in the hierarchy of the hetida platform, you also assign permissions to access the content. Assign different roles for your users to distribute fine-grained authorizations.
- Who can see which parts of the hierarchy?
- Who can create new elements?
- Who can edit existing elements?
Private dashboards, shared with individuals, the entire company or even with public access – the security concept of the hetida platform secures your data.
Security that grows with you - without compromise
Granular authorizations
Define exactly who sees which assets, dashboards or IoT data – from interns to the Management Board.
End-to-end encryption
End-to-end encryption for data in transit and at-rest.
Why does this create trust?
No back doors
Row level Security makes you the sole owner of your data.
No vendor lock-in
Use your existing SSO infrastructure, we fit in instead of replacing it.
Request a free demo now!
Experience the IoT and analytics platform live and make an appointment.
Our experts will get in touch with you shortly.
We look forward to hearing from you.