The Aura Processing Unit (APU) is built with the latest industry-standard best practices for data protection and security, covering every element of the hardware, software and networking infrastructure.
Our device hardware is manufactured by trusted partners who adhere to the same stringent security policies that we do.
All software shipped to our APUs is 'signed' with Aura Vision's secret key. That means nobody can run code on our devices but us.
The root filesystem on the Aura Vision APU is encrypted, and a dedicated 'confined memory space' is allocated to temporarily store video and analytics data. Only software signed by Aura Vision be executed on the device and only authorised applications are able to read the filesystem and confined memory space.
Network security is one of the most critical components for any cloud-connected infrastructure. At Aura Vision, we've covered all the bases to ensure that your data is protected as it’s transferred over the network.
All data communicated between our cloud platform and APUs is encrypted with AES 128 standards and transferred using HTTPS over TLS v1.3 exclusively. Once in our cloud platform, all data is encrypted at rest using AES 256, one of the most cryptographically secure industry-standard encryption algorithms.
Aura Vision follows industry best practice when it comes to designing our network communication processes. Our APUs don't accept inbound connection requests so bad actors can't alter our device software remotely.
Solely communicating over HTTPS means that all of our data enters and exits through the secure port 443.
We usually do not require any new firewall rules as our system uses common Web ports.
Aura Vision's security measures extends to each user who logs into our software. We give you the tools you need to control who has access to your system, and what they do with that access.
We partner with Auth0, the most trusted authentication provider in the industry to enable a range of sign-in options including SSO, LDAP and Multi-Factor authentication.
Easily customisable permission levels can be set to give specific users access to the dashboard, API environment as well as team management.
All data is secured and can only be accessed with encrypted tokens, either through our dashboard or API.