How We Keep Your Data Secure

At RX°, data security is foundational to everything we do. From the moment your sensor captures temperature data to when it's stored in the cloud or displayed on your dashboard, every step is encrypted, authenticated, and protected using modern security protocols.

On The Edge: Secured via LoRaWAN

At the edge, our sensors and gateways communicate using the LoRaWAN protocol, which provides end-to-end encryption using AES-128 symmetric keys. Two keys are used to protect every message:

  • Network Session Key (NwkSKey) - encrypts MAC-level network messages
  • Application Session Key (AppSKey) - encrypts sensor payload data
Secure IoT Data Flow Diagram

These keys are securely negotiated when the device joins the network, and messages are never decrypted by gateways—ensuring full confidentiality between the device and cloud.

In Transit: TLS/SSL Encryption

Data transmitted from gateways to the cloud is protected with Transport Layer Security (TLS). Whether through HTTPS or other secure transport protocols like DTLS or VPN, every message remains encrypted while in motion.

In The Cloud: Secured IoT Platform

Our cloud infrastructure uses industry-standard HTTPS (TLS/SSL) for data ingestion, and all communications between services—internal or external—are encrypted. Device and gateway metadata are managed in a secure registry using the DevEUI and AppEUI identifiers.

We implement strict Access Control Lists (ACLs) for all user and staff interactions, and sensitive information is encrypted at rest in our databases.

In The Application: API-Level Security

All user access to our web dashboards and APIs is secured using OpenID Connect (OIDC) and SAML 2.0, ensuring that only authenticated and authorized requests are allowed.

These are the modern security standards used globally to protect user identities, manage access tokens, and enable secure communication between services.

Complete Trust, End-to-End

From sensor to screen, RX° ensures that every byte of your data is encrypted, authenticated, and protected using enterprise-grade security standards, so you can monitor with confidence.

;