Skip to main content
Network Security

Security at Domotz

Domotz operates its network monitoring infrastructure with a security-first posture, audited to SOC 2 Type II and certified under ISO/IEC 27001:2022. This page documents the standards, physical safeguards, and data-security controls that protect customer networks and credentials.

Security and reliability of services are our top priority in everything we do at Domotz — utilizing enterprise grade best practices to protect our customers.

No credit card required

Defense in Depth

Defense in Depth (layered defensive mechanisms), and Defense in Breadth (multiple and automated security controls) are the pillars of our cyber defense strategy. Comprehensive and layered physical, technical and administrative controls are in place to protect data and to block threats before they can reach endpoints.

Today's cyberthreats are evolving and growing rapidly. We continuously review and enhance our defenses.

Compliance

Security standards and compliance

Audited, certified, and aligned with the most widely-adopted security frameworks in IT.

  • SOC 2 Type II

    SOC 2 Type II

    SOC 2 is a set of compliance requirements and audit procedures for technology-based service organizations that store customer data in the cloud. Domotz continuously enforces, improves, and audits all its controls relevant to security to ensure compliancy with SOC 2. Controls include physical and logical access, control environment and activities, risk assessment and mitigations, system operations, change management, communications and information. Independent auditing firms perform regular audits and issue periodic reports. Our customers can contact privacy@domotz.com to obtain the latest available SOC 2 report.

  • ISO/IEC 27001:2022

    ISO/IEC 27001:2022

    ISO/IEC 27001 is the world's best-known standard that outlines best practices for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive company and customer information, incorporating processes, people, and technology to protect data confidentiality, integrity, and availability. Domotz is certified under the standard ISO/IEC 27001:2022. Independent certification bodies conduct periodic audits and verify Domotz's adherence to the standard, ensuring that best practices are rigorously followed.

  • CIS Control

    CIS Control®

    Domotz has also adopted CIS Control® as a global standard and a set of recognized best practices for securing IT systems and data against the most pervasive attacks and threats.

  • OWASP

    OWASP

    Domotz is also part of the OWASP community and uses a number of OWASP tools and resources, as well as OWASP's education and training programs.

Physical and data center security

Domotz servers are hosted on Amazon Web Services (AWS), state-of-the-art data centers with electronic surveillance, multi-factor access control, and 24-7 security guard protection.

The data centers are ISO 27001, ISO 27017, and ISO 27018 certified, and undergo regular SOC 2 Type II audits.

Data security

Domotz has adopted the best administrative, physical, and technical industry-standards to protect the confidentiality of data and the security of credentials stored in the system.

Domotz uses strong cryptography and security protocols for data in transit and at rest. Cryptographic keys are managed, secured, restricted and rotated according to the recommendations of the National Institute of Standards and Technology (NIST SP 800-57 Part 1: Recommendation for the management of encryption keys).