FERMAX

1

Safety from the start

We ensure that our products meet reliability and security requirements from the earliest design stages. We use the Secure by Design methodology to ensure protection from implementation to final deployment.

2

Lifetime protection

Security is not a short-term goal, but a commitment that spans the entire product lifecycle. We use tools such as Snyk and SonarCloud to analyse and fix potential vulnerabilities in the source code of our applications.

Security advisories
3

Secure and encrypted communications

All communications between our connected devices use secure protocols such as HTTPs or secure messaging. Audio and video are encrypted end-to-end using protocols such as SRTP (Secure Real-Time Transport Protocol), ensuring privacy and reliability in every communication.

4

Security in constant evolution

We regularly audit our products with ethical hacking experts and release security updates to our devices throughout their lifecycle, either remotely or through a local network connection.

If you have found a vulnerability in our products, please let us know using this form:

Report vulnerability
5

We protect your data

To ensure the security of your data, we carry out regular audits and use Microsoft Azure as our cloud infrastructure. All of our services are hosted in data centres in Europe and comply with GDPR, ISO 27701 and HIPAA regulations.