Enterprise-grade Data Security and Compliance

Enterprise users worldwide trust FlytBase to safeguard their drone docks and data.
FlytBase Shield provides multi-layer protection at the edge, on the cloud, on-premises, or via an air-gapped system. FlytBase cyber security experts make your IT compliance and cyber security assessments swift and easy.
Download FlytBase Shield White paper

FlytBase Security Architecture

How FlytBase Shield keeps your data secure

With multiple layers of protection that includes secure data transfer, encryption, network configuration, and application-level controls, FlytBase platform is designed with security in mind. We also use tools to help us enforce compliance with our internal security policies.
Diagram of FlytBase architecture showing FlytBase Cloud Infrastructure with application web servers and interfaces, 3rd party integrations via Flinks with various drone and software platforms, User web application with operations dashboard, and Secure Devices Edge with drone dock, AI processing, streaming, and hardware integrations.

Compliances and Certifications

FlytBase complies with essential industry standards, privacy laws, and certifications.

Three black cubes with certification logos: ISO 27001, AICPA SOC formerly SAS 70 Reports, and GDPR surrounded by stars.

Data protection

Data isolation

Each user's data in FlytBase is securely separated and accessible only to authorized users.

Data encryption

FlytBase encrypts data at rest and in transit using AES-256 and TLS 1.2 protocols, respectively.

Recovery and Redundancy

Operational data is stored across multiple secure locations with continuous replication and backups

Network security

Firewalls on all communication channels to prevent unauthorized access, restrict malicious attackers, and block communication with any unauthorised servers.

Application security

Vulnerability Assessment

Regular third-party vulnerability assessments are performed to identify and resolve security threats and weaknesses.

Penetration Testing

FlytBase undergoes application and its underlying infra penetration tests by independent security specialists.

Development Standards

FlytBase adheres to the coding standards set by the OWASP and incorporates Static Application Security Testing (SAST).

IT compliance and support 

CIS, NIST frameworks followed to ensure compliance with industry-agreed cybersecurity standards. FlytBase experts provide on-demand support to meet IT compliance requirements for enterprises.

Identity and User Management

Roles and Permissions

Role-based access control (RBAC) are offered for different kinds of dashboard users (admin, operator, viewer).

OAuth Login

Authenticate seamlessly using your existing Google or Microsoft enterprise credentials. Streamline access with trusted OAuth 2.0 integration while maintaining security and user convenience.

Enterprise Single sign-on (SSO)

Authenticate through your enterprise identity management system for centralized authentication and access control. Maintain security compliance, enforce organizational policies, and enable seamless integration with your existing IT infrastructure.

Data Privacy

GDPR

FlytBase is committed to handling all customer and employee personal data in line with the EU’s General Data Protection Regulation (GDPR). We have integrated all required measures and processes for personal data security, as per GDPR standards, into our systems.
Graphic illustration of a central GDPR chip connected to abstract data elements representing personal information, documents, and storage, symbolizing data security.

Need additional security?

FlytBase offers flexible deployment options, including the option to operate on a separately managed AWS environment with physical isolation from the shared infrastructure of our multi-tenant cloud offering, giving an additional layer of security and privacy.

Flexible Deployment Options

Isometric illustration of a cloud connected to three individual users represented by icons enclosed in translucent cubes.

Cloud

FlytBase Cloud provides cost-effective access with enterprise-level security. It complies with SOC2 Type II, ISO 27001, and GDPR standards, and enables integration with private cloud storage.
Isometric illustration of cloud computing with three user icons each enclosed in a transparent cube connected to a central cloud symbol.

In-country Cloud

Deploy FlytBase in your own country’s cloud to ensure compliance with data residency norms, data security, & the ability for customers to integrate with their preferred applications.
Abstract digital illustration of a user icon surrounded by three stacked server or database units interconnected with blue transparent lines.

On-premises

Self-host FlytBase on a private server for highly secure & confidential projects. Meet cyber security compliance requirements and have complete control over your drone data.
Isometric illustration of a person icon surrounded by three layered stacks connected by transparent lines on a black platform with an orange grid overlay.

Air-Gapped

FlytBase Air-Gapped operates offline, isolated from external networks, ensuring data security. Ideal for sensitive applications that require maximum protection.

Want more information?

Know more
Blue translucent cube with a glowing abstract wave symbol inside and three small orange geometric shapes floating nearby.