Acelerex incorporates industry-leading security measures to protect data during transfer and storage, safeguarding against unauthorized access.
Acelerex REXTM employs state-of-the-art cyber security measures to protect the control and telecommunication systems from cybercrime and viruses including but not limited to:
- Encryption
- Firewalls
- Intrusion detection
- Prevention systems
- Two-factor authentication
-
- Network
- Application
- Information
- Access Control
- Cloud
- Operational
- Encryption
The cybersecurity policies for Acelerex deployments are designed to ensure protection against potential threats and unauthorized access. These policies include implementing network segmentation to isolate critical assets, enforcing strict firewall rules to regulate network traffic, and allowing remote access exclusively through VPN connections. The use of industry-standard protocols like IPsec, coupled with encryption algorithms such as AES and key exchange mechanisms like IKEv2, ensures secure VPN connections and data integrity.
We regularly review our posture and conduct peer reviews for best practices.
Acelerex leverages services with NIST 800 attestations.