Security at Hologram

Securely connect your devices through Hologram’s cellular network

Access three layers of firewalls through cellular technology

 

GATEWAY PERIMETER 

Protects devices from unwanted connections from internet

 

CUSTOMER ISOLATION 

Protects devices against unintended inside threats

 

DEVICE ISOLATION

Protects against hackers leveraging IoT devices to communicate to other devices 

 

Network

Proof of performance

We exceed industry best practices in network uptime and share data transparently with customers in a Proof of Performance report. 

 

Monitoring

Hologram constantly monitors network connectivity to detect outages.

 

Communication

Customers can sign up to receive outage alerts via SMS, Slack, phone, webhook, and email on the dashboard.

 

Platform

Hologram Inflight

Inflight detects inconsistent data usage to monitor for device tampering.

 

Device management

Easily pause and deactivate devices that have been tampered with.

 

 

Was this article helpful?
0 out of 0 found this helpful