Your Peace of Mind Guaranteed
Your Peace of Mind
Guaranteed

Security, Privacy & Performance at OLOID

OLOID implements industry’s leading security practices and conforms to
the most stringent standards for data privacy to keep you protected and compliant. Your data is your property, and that’s why we keep you posted
on how we gather, use and manage the captured data and information.
Security, Privacy & Performance at OLOID
oloid-solutions-cre-leverage-existing-infrastructure-2560x1718
oloid-smart-reader-GO-unlock-your-doors-safely-1746 × 1899
Security, Privacy & Performance at OLOID
oloid-solutions-cre-leverage-existing-infrastructure-2560x1718
oloid-smart-reader-GO-unlock-your-doors-safely-1746 × 1899
Cap Security Banner Image4

Need further info?

Download the OLOID Security and Privacy Whitepaper.

Fortify your workplace security with strong fundamentals

Unify your physical and digital identities, and avoid risks such as theft of ID cards, access credentials, or intellectual property. With your security as our core principle, we have incorporated features such as multi-factor authentication, RBAC, SSO, and data privacy compliance along with automatic upgrades to ensure there are zero security compromises.

01 Physical security

OLOID improves your workplace security expeditiously by enabling Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), Contact Tracing, Anomaly Detection, Tailgating Detection, Health Attestations, Real-time audit logs, real-time alerts, and more.

02 Cyber Security

Replicate the physical security standards to your cyber security profile with AI-powered and cloud-secure platform, MFA, Mobile Access, Single Sign On (SSO) integrations, RBAC, real-time analytics and notifications, and more.

03 Data Privacy

The security loop cannot be completed without securing data privacy and regulatory compliances. OLOID ensures end-to-end data encryption, multi-modal authentication, unique mobile credentials, cloud-based security and more to ensure the data is not cloned and compromised. We are fully compliant with GDPR, CCPA, and other data privacy regulations.

Security Practices

State-of-the-art architecture with GeoAssurance

OLOID runs on highly available and secure servers that are based in Ohio, Northern Virginia, and San Francisco, with above industry-level encryption and military-grade security.

01

Scan. Analyze.
Deploy. Maintain.

Physical access driven by
cyber framework and AI

OLOID's platform is built on proven security practices in the cyber world and by adapting them to the physical world to meet the needs of security-conscious businesses. OLOID ensures that the user data is stored and managed as per a robust consent-based privacy framework. OLOID complies with the leading regulations and most stringent legal jurisdictions to minimize compliance risks. Access is designed to be fast and frictionless. Improving security doesn't mean we have to compromise on speed.

02

Security and privacy
compliance

GDPR, CCPA and more

OLOID ensures that the user data is stored and managed as per a robust consent based privacy framework. OLOID complies with the leading regulations and most stringent legal jurisdictions to minimize compliance risks.

03

Authenticate in
fraction of a second

Optimized for high performance and faster authentication

Access is designed to be fast and frictionless, improving security doesn't mean we have to compromise on speed. With an average of 0.5 seconds of authentication rate across hundreds of thousands of users, OLOID is setting the performance benchmark for the Industry.

Previous
Next

The Complete Security Suite

Security practices and features

  • Biometric access control at our facilities
  • Data encryption during transmission & storage
  • Daily manual & automatic malware scans
  • Automated vulnerability checks and audits
  • Active CI/CD integrated security scans
  • Active internal bounty program
  • Dedicated DevOps team on payroll
  • Support for data loss prevention
  • App modularity with microservices
  • Periodic third party penetration testing

Application Security

No consumer has access to the data of another. Authenticated sessions, which are necessary for any page access, are enforced on various tiers of the architecture. Session data is stored in cookies that do not contain any personally identifiable information about customers. During page access, no client ID is ever transferred or kept, preventing ID spoofing.

Physical Security (Hosting)

Amazon maintains physical security through a variety of approaches, as detailed in their Security Whitepaper, with their EC2 service providing the physical hosting infrastructure. Amazon's EC2 service uses the same buildings, servers, and infrastructure as their multibillion-dollar Amazon.com retail operation, so you
can rest certain that your application and data are safe.

Transport Security

We use high-grade encryption powered by AWS KMS to secure all communication between customers and our data center (AES-256 Bit). OLOID's applications and services can only be accessed through secure sessions (https) and with an authenticated login and password. Passwords are never transferred or kept in their original form, ensuring that they are never compromised.

Disaster Recovery Program

We can deliver a best-in-class disaster recovery program by leveraging the Amazon AWS cloud. We eliminate the danger of client data loss by using Amazon AWS services for data storage, as explained above. If a customer's primary hardware breaks, we can quickly swap to the secondary hardware, which is running in parallel with the primary.

Hardware Security

No data is stored in the hardware. The hardware simply transmits information to the existing reader. The Keys are used for secure communication between the app and the M-Tag.

Previous
Next

Derisk your workplace with
the OLOID Secure Approach

Security Risks & Challenges OLOID Secure Approach
Access ModeAccess modes such as PINs, Proximity cards, and fobs are easily lost, forgotten, stolen, or cloned, making them vulnerable modes of access. OLOID provides mobile access with multi-factor authentication and cloud-based data security.
Reader SecurityCard readers with data storage capabilities are prone to physical tampering and technical glitch, which can compromise your PACS and result in loss of data. OLOID Smart reader is app-based cloud-storage capabilities, making it tamper-proof and secure.
Data StorageServer-based data storage is exposed to multiple cyber threats and hacks. OLOID provides end-to-end encrypted data storage on its cloud-based platform to make your data completely secure.
Data IntelligenceMultiple manual efforts are needed to gather data to understand and process usage patterns and processes. OLOID’s in-built capabilities provide automated, consolidated and intelligent data analytics, audits, reports, and more.
IoTManagement of IoT devices is extremely tedious and risky with outdated and difficult to upgrade firmware. OLOID offers complete peace of mind with automated management, enabled with multiple integrations, to ensure your IoT devices are up-to-date, secure and seamless.
Mobile SecurityMobile security methods have to adhere to various wireless and network protocols. Interactions on OLOID Apps are fully encrypted, eliminating manual interventions to secure your PACS or dependencies on wireless protocols.
Audit LogsDifferent PACS work in silos, making it difficult to manage centralized and unified audit reports and logs. OLOID captures, verifies, processes and stores all access data on cloud for you to access them from anywhere, anytime.
Security Risks & Challenges OLOID Secure Approach
Access Mode Security Risks & Challenges Access modes such as PINs, Proximity cards, and fobs are easily lost, forgotten, stolen, or cloned, making them vulnerable modes of access. OLOID Secure Approach OLOID provides mobile access with multi-factor authentication and cloud-based data security.
Reader Security Security Risks & Challenges Card readers with data storage capabilities are prone to physical tampering and technical glitch, which can compromise your PACS and result in loss of data.OLOID Secure Approach OLOID Smart reader is app-based cloud-storage capabilities, making it tamper-proof and secure.
Data Storage Security Risks & Challenges Server-based data storage is exposed to multiple cyber threats and hacks.OLOID Secure Approach OLOID provides end-to-end encrypted data storage on its cloud-based platform to make your data completely secure.
Data IntelligenceSecurity Risks & Challenges Multiple manual efforts are needed to gather data to understand and process usage patterns and processes.OLOID Secure Approach OLOID’s in-built capabilities provide automated, consolidated and intelligent data analytics, audits, reports, and more.
IoT Security Risks & Challenges Management of IoT devices is extremely tedious and risky with outdated and difficult to upgrade firmware.OLOID Secure Approach OLOID offers complete peace of mind with automated management, enabled with multiple integrations, to ensure your IoT devices are up-to-date, secure and seamless.
Mobile Security Security Risks & Challenges Mobile security methods have to adhere to various wireless and network protocols.OLOID Secure Approach Interactions on OLOID Apps are fully encrypted, eliminating manual interventions to secure your PACS or dependencies on wireless protocols.
Audit Logs Security Risks & Challenges Different PACS work in silos, making it difficult to manage centralized and unified audit reports and logs.OLOID Secure Approach OLOID captures, verifies, processes and stores all access data on cloud for you to access them from anywhere, anytime.
AICPA-logo
CCPA Certification Logo
CE Certification Logo
FC Certification Logo
GDPR Logo
IP65 Rated Certification Logo

Enabling security in the modern workplace

pet-tracking-tablet 1

Our Products

Learn more about our approach
to authentication, automation and identity management.

Our Solutions

Learn how workplaces are boosting safety, security and compliance by using OLOID’s technology.

Our Company

Learn more about the mission, vision and values that guide our way forward and get to know our leadership team.