Connect with confidence. 


5G IoT smart access is secure by design

Unlike some forms of connectivity, 5G IoT networks (NB-IoT, LTE-M) are carefully managed and secured by mobile network operators. As such, the growing usage of 5G IoT helps counter security threats to the IoT, such as the hijacking of devices by botnets and the hacking of sensitive data belonging to individuals or organisations.


6.64 Billion

people worldwide have connected smartphones

What makes a secure network? One that supports an array of security features and safeguards that people trust.

Speed and reliability matters

NB-IoT gives great security and encryption

Network security

Protection against threats

Mobile Network Operators restrict communications from 5G IoT devices to specific servers so a compromised device is unable to communicate with any other device.

Secure communication channels

Complete end-to-end security

Many security layers

Mobile operators help IoT device manufacturers keep their data communications isolated from other traffic.

Construction Site Managers


GSMA Security Report

GSMA gives insights on how Mobile Network Operators have re-engineered security for IoT devices with a multi-layered approach.

Protect your assets and people with the best security


3GPP/GSMA Security

5G IoT has passed strict security protocols by 3GPP/GMSA the organisations responsible for managing mobile networks globally.


Fully standardized

5G IoT is part of mobile networks with fully managed standardized security guaranteeing the integrity of all data running through it.


IPSEC security 

Between the telco's mobile network, and the IoT device management platform, a layer of Internet Protocol Security (IPSEC) is provided.


VPN security layer

The Telecommunication company provides a dedicated VPN for further security and reliability.


RSA Chipset security

The NB IoT module chipset included in our smart locks applies 2048 bit RSA encryption.


Military grade encryption

All communications are running on HTTPs military grade 256 bit encryption between all the vertical applications 

All other locking technology has been hacked


RFID locks have been hacked

RFID keycard locks shown to be hacked at DEFCON conference

Hacking gallery

RFID locks have been hacked

Hackers tell a Wi-Fi lock to open with few lines of code.

Hacking gallery


Hacking gallery

Researchers find huge security flaws in Bluetooth locks


Want the latest security news in your inbox? 

Subscribe to our newsletter to get the latest updates, insights and security trends for smartlocks