HOME > FEATURES > SECURITY

Connect with confidence.
SECURITY AND ENCRYPTION
5G IoT smart access is secure by design
Unlike some forms of connectivity, 5G IoT networks (NB-IoT, LTE-M) are carefully managed and secured by mobile network operators. As such, the growing usage of 5G IoT helps counter security threats to the IoT, such as the hijacking of devices by botnets and the hacking of sensitive data belonging to individuals or organisations.

6.64 Billion
people worldwide have connected smartphones
What makes a secure network? One that supports an array of security features and safeguards that people trust.
Speed and reliability matters

Network security
Protection against threats
Mobile Network Operators restrict communications from 5G IoT devices to specific servers so a compromised device is unable to communicate with any other device.
Secure communication channels
Complete end-to-end security
Many security layers
Mobile operators help IoT device manufacturers keep their data communications isolated from other traffic.


Whitepaper
GSMA Security Report
GSMA gives insights on how Mobile Network Operators have re-engineered security for IoT devices with a multi-layered approach.
Protect your assets and people with the best security

3GPP/GSMA Security
5G IoT has passed strict security protocols by 3GPP/GMSA the organisations responsible for managing mobile networks globally.

Fully standardized
5G IoT is part of mobile networks with fully managed standardized security guaranteeing the integrity of all data running through it.

IPSEC security
Between the telco's mobile network, and the IoT device management platform, a layer of Internet Protocol Security (IPSEC) is provided.

VPN security layer
The Telecommunication company provides a dedicated VPN for further security and reliability.

RSA Chipset security
The NB IoT module chipset included in our smart locks applies 2048 bit RSA encryption.

Military grade encryption
All communications are running on HTTPs military grade 256 bit encryption between all the vertical applications
All other locking technology has been hacked
News

Want the latest security news in your inbox?
Subscribe to our newsletter to get the latest updates, insights and security trends for smartlocks