Trust Center

Security, privacy, compliance, and reliability are foundational to our products and services. Explore our policies and technical safeguards below.

How we protect your data

  • Encryption: TLS in transit; industry-standard encryption at rest.
  • Access controls: least-privilege, role-based access, and credential rotation.
  • Monitoring: logging and anomaly detection across core services.
  • Secure SDLC: code review, dependency management, and vulnerability scanning.
  • Resilience: backups and disaster recovery procedures for critical systems.
  • Incident response: documented playbooks and post-incident reviews.

Security at a glance

  • TLS in transit; encryption at rest
  • Least‑privilege RBAC; SSO/MFA
  • Signed firmware with staged OTA & rollback
Learn more →

Subprocessors

  • Trusted cloud and tooling providers
  • List maintained and updated as needed
View list →

Quality & lifecycle

  • 100% functional and RF test
  • Per‑device serialization & backward compatibility
Learn more →