Security and Privacy

Security and Privacy

Voxel’s platform is built from the ground up with security and privacy in mind. We design our services for security and reliability, taking a defensive approach to secure your organization’s data, at multiple layers. All the data generated from our system is always held to the highest security standards.

Secure by design

Voxel utilizes the latest security standards and techniques to secure and protect your data

Full end-to-end encryption secured with TLS v1.2 & AES-256

Role-based access controls with the ability to set permissions at the location & camera level

Data captured, stored, or processed by Voxel is encrypted by default when in transit over public networks or at rest in the Voxel cloud.

All customer interactions via the dashboard, Voxel mobile apps, and API; require encrypted connections

SOC 2 compliance expected (Q2 2022)

Voxel has implemented safeguards to protect the creation, storage, retrieval, and destruction of secrets such as encryption keys and account credentials.

Hardened Cloud Infrastructure

Voxel’s cloud-hosted infrastructure is designed and managed following the industry best security standards. Our underlying infrastructure leverages Amazon Web Services and Google Cloud Platform, which are ISO 27001 and SOC 1 Type II certified.

Network devices, including firewall and other boundary devices, are in place to monitor and control communications at the external boundary of the network and at key internal boundaries within the network.

Network devices, including firewall and other boundary devices, are in place to monitor and control communications at the external boundary of the network and at key internal boundaries within the network.
These boundary devices employ rule sets, access control lists (ACL), and configurations to enforce the flow of information to specific information system services. Administrative access to Voxel’s infrastructure is highly restricted and verified by public key (RSA). Distributed Denial of Service (DDoS) attacks are mitigated with elastic load balancing and highly available DNS services.

Voxel is built on a secure multi-tenant cloud architecture. Customer data is separated across distributed databases with required authentication checks for every application layer and data-layer access made to any tenant's data. The logical separation ensures that data is always associated with exactly one customer, and required authentication checks at the application and data layers ensure that data is completely isolated by customer and accounts.

Penetration Testing

Voxel works with independent entities to conduct application, infrastructure, and hardware-level penetration tests at minimum once a year. Executive summaries of these activities can be shared by requesting them from your account manager.

Voxel works with independent entities to conduct application, infrastructure, and hardware-level penetration tests at minimum once a year.

Executive summaries of these activities can be shared by requesting them from your account manager.

Policies

Contact

For additional questions, please reach out at [email protected]