Comprehensive information security
To ensure reliable insights for planning and security, Isarsoft Perception integrates robust cybersecurity measures directly into the software development lifecycle.
.avif)
Information security matters
At Isarsoft, pirvacy and information security have always been at the core of our values. We believe that information security is not only a responsibility but also a foundation for building lasting trust with our customers, partners and stakeholders.
Security by Design
Information security is a central component of the development process, ensuring that every deployment architecture, is built to prioritize data integrity and minimize potential attack surfaces.
Proactive risk management
Risks are managed systematically through regular internal and external audits
Certified Standards and best practice
Policies and controls fulfill the internationally recognized ISO/IEC 27001 standard and our operational workflows align with worldwide standards to stay ahead of evolving threats.
Information security in practice
Encryption and Communication
Secure data exchange:
Communication between the user interface and server is secured via HTTPS.
Maximum privacy standards:
Encryption exclusively utilizes TLS with Perfect Forward Secrecy (PFS).
Certificate management:
While generating a self-signed certificate by default, Isarsoft Perception supports custom certificates to meet specific corporate security requirements.
Access Management
Strict control:
Access to the GraphQL API, UI, and sensitive data is governed through an integrated user management system.
Cryptographic security:
Passwords are stored exclusively as salted hashes.
User management:
A role-based structure prevents unauthorized access; E.g. the "Restricted User" level is systemically prohibited from viewing video or image data.
Multi-factor authentication:
Granular identity management includes MFA to ensure only authorized personnel access the system.
Vulnerability and Product Security
Continuous scanning:
The IT environment is scanned regularly, with risks classified and prioritized according to the Common Vulnerability Scoring System (CVSS).
Resilience verification:
Regular penetration tests verify the resistance of the software against targeted attacks.
Minimal attack surface:
The architecture is designed to minimize exposure points and prioritize data integrity.
Local processing for data sovereignty
On-premise & edge deployment:
Local processing on edge devices or private servers keeps sensitive video streams within the secured customer network.
Physical protection:
Data remains physically protected from external access by staying within the secured internal infrastructure.
Independent operation:
Local processing enables functionality without an external internet connection, eliminating security concerns associated with cloud-based solutions.
.avif)
Certified security processes
Achieving the ISO/IEC 27001 issued by TÜV Süd, means that Isarsoft’s information security practices, policies, and controls have been independently audited and found to meet the highest global standards.
ISO/IEC 27001 is the internationally recognized standard for information security management systems (ISMS). It provides a systematic framework for managing sensitive information, ensuring confidentiality, integrity, and availability, while continuously improving risk management processes.
Ready for intelligent video analytics without risk?
.avif)
Further resources
FAQ
Can't find the answer to your question?
Contact us now!
Does Isarsoft Perception process and store all data locally on customers` hardware, or is any data transmitted to Isarsoft servers or third-party cloud services?
By default, Isarsoft Perception is an on-premises/edge-based solution. All video stream processing and data generation occur on the hardware of the customer, e. g. on edge units or central servers. No raw video data or metadata is transmitted to Isarsoft servers. Cloud use is entirely optional.
Some customers prefer to send anonymous metadata to cloud vendors for reporting purposes but that can also be achieved with local infrastructure. If you choose a local deployment, zero data is transmitted to Isarsoft or third-party providers.
Does the software require regular communication with Isarsoft servers to verify the license, even when running locally?
No, Isarsoft Perception supports offline license activation. For deployments in remote regions or high-security environments with intermittent or no internet connectivity, the system does not require a "heartbeat" or constant connection to our servers. If a connection is unavailable, the software continues to function normally without interruption.
Who owns the data collected and generated by Isarsoft Perception?
Our customers maintain 100% ownership of all data collected and generated (metadata, images, and reports). Isarsoft does never access to operational data.
Is any of the customers` operational data used by Isarsoft for model training, product development, or any other purpose?
We never use customer data for model training or product development without explicit, written consent and a separate data-sharing agreement.
How does Isarsoft notify customers of security vulnerabilities or data breaches that may affect their deployment?
If we identify a vulnerability in our software, we notify affected customers via technical bulletins and provide patched versions or mitigation steps.
Is it possible to operate the software in a fully air-gapped or offline environment?
Yes, the software is fully capable of operating in a completely air-gapped or offline environment. This is a core feature for our infrastructure and security-conscious clients.


.avif)