Security you can trust

Physical security is our business, and we take it seriously. ctrlentry is built from the ground up with security as a core principle, not an afterthought.

Built-In Security Features

End-to-End Encryption

All data transmitted between your devices, our servers, and your controllers is encrypted using TLS 1.3 with 256-bit encryption.

Passkey Authentication

Support for FIDO2/WebAuthn passkeys provides phishing-resistant authentication that's more secure than passwords.

Role-Based Access Control

Granular permissions ensure users only have access to the features and data they need. Administrators can customize roles for any requirement.

Comprehensive Audit Logs

Every action is logged and timestamped. Track who did what, when, and from where. Logs cannot be modified or deleted.

Secure Gateway Communication

The gateway uses mutual TLS authentication with certificate pinning. Each gateway has a unique cryptographic identity.

Data Isolation

Each tenant's data is logically isolated. Strict access controls prevent cross-tenant data access at every layer.

Compliance & Certifications

We maintain rigorous compliance standards to meet enterprise requirements.

SOC 2 Type II

Our infrastructure and processes are audited annually for security, availability, and confidentiality.

GDPR Compliant

Full compliance with EU data protection regulations including data minimization and right to erasure.

CCPA Compliant

California Consumer Privacy Act compliance for users in California.

Enterprise Infrastructure

Our platform runs on enterprise-grade infrastructure designed for reliability and security.

99.9% Uptime SLA

Enterprise-grade infrastructure with redundancy across multiple availability zones.

24/7 Monitoring

Continuous security monitoring and automated threat detection.

Regular Penetration Testing

Third-party security assessments to identify and address vulnerabilities.

Automatic Backups

Encrypted backups with point-in-time recovery capabilities.

Security Questions?

We're happy to discuss our security practices, provide additional documentation, or complete security questionnaires for your organization.