Enterprise-grade Data Security and Compliance Platform
Enterprise users worldwide trust FlytBase to safeguard their drone docks and data. FlytBase Shield provides multi-layer protection at the edge, on the cloud, on-premises, or via an air-gapped system. FlytBase cyber security experts make your IT compliance and cyber security assessments swift and easy.
With multiple layers of protection that includes secure data transfer, encryption, network configuration, and application-level controls, FlytBase platform is designed with security in mind. We also use tools to help us enforce compliance with our internal security policies.
Data protection
Data isolation
Each user's data in FlytBase is securely separated and accessible only to authorized users.
Data encryption
FlytBase encrypts data at rest and in transit using AES-256 and TLS 1.2 protocols, respectively.
Recovery and Redundancy
Operational data is stored across multiple secure locations with continuous replication and backups
Network security
Firewalls on all communication channels to prevent unauthorized access, restrict malicious attackers, and block communication with any unauthorised servers.
Application security
Vulnerability Assessment
Regular third-party vulnerability assessments are performed to identify and resolve security threats and weaknesses.
Penetration Testing
FlytBase undergoes application and its underlying infra penetration tests by independent security specialists.
Development Standards
FlytBase adheres to the coding standards set by the OWASP and incorporates Static Application Security Testing (SAST).
IT compliance and support
CIS, NIST frameworks followed to ensure compliance with industry-agreed cybersecurity standards. FlytBase experts provide on-demand support to meet IT compliance requirements for enterprises.
Identity and User Management
Secure Authentication
Secure user authorization with OAuth 2.0 including web server & client-side scenarios.
Roles and Permissions
Role-based access control (RBAC) are offered for different kinds of dashboard users (admin, operator, viewer).
Incident Response & Monitoring
Proactive measures for detecting, managing, and swiftly responding to security incidents in real time.
Single sign-on (SSO)
Two-factor (2FA) based account authentication with Google and Microsoft
