Safety from the start
We ensure that our products meet reliability and security requirements from the earliest design stages. We use the Secure by Design methodology to ensure protection from implementation to final deployment.
At Fermax, we offer innovative solutions to keep you connected to your home or business. But connectivity is not just about technology, it is also about trust. That is why the security and privacy of your data is at the heart of everything we do.
We guarantee data protection and confidentiality of communications to provide maximum security for our users, distributors and installers. Because protecting what matters is not an option, it is our standard.
At Fermax, we offer innovative solutions to keep you connected to your home or business. But connectivity is not just about technology, it is also about trust. That is why the security and privacy of your data is at the heart of everything...
At Fermax, we offer innovative solutions to keep you connected to your home or business. But connectivity is not just about technology, it is also about trust. That is why the security and privacy of your data is at the heart of everything we do.
We guarantee data protection and confidentiality of communications to provide maximum security for our users, distributors and installers. Because protecting what matters is not an option, it is our standard.
We ensure that our products meet reliability and security requirements from the earliest design stages. We use the Secure by Design methodology to ensure protection from implementation to final deployment.
Security is not a short-term goal, but a commitment that spans the entire product lifecycle. We use tools such as Snyk and SonarCloud to analyse and fix potential vulnerabilities in the source code of our applications.
Security advisoriesAll communications between our connected devices use secure protocols such as HTTPs or secure messaging. Audio and video are encrypted end-to-end using protocols such as SRTP (Secure Real-Time Transport Protocol), ensuring privacy and reliability in every communication.
We regularly audit our products with ethical hacking experts and release security updates to our devices throughout their lifecycle, either remotely or through a local network connection.
If you have found a vulnerability in our products, please let us know using this form:
Report vulnerabilityTo ensure the security of your data, we carry out regular audits and use Microsoft Azure as our cloud infrastructure. All of our services are hosted in data centres in Europe and comply with GDPR, ISO 27701 and HIPAA regulations.