Cybersecurity

Liveline Technologies employs best practices to ensure full compliance with your cybersecurity requirements. Our highest priority is the protection of your data and the connection to physical assets in your factory.

At the top level, we conceptualize security into things we need to do on our side (within our hybrid cloud) and things you need to ensure on your side.

On our side

Inside your plant, we maintain edge devices (one or more computers) that are ultimately networked to your PLCs and production equipment. These edge devices communicate wth Liveline cloud services via encrypted communications. This is how we receive data to train AI controllers, and it’s how we push AI controllers back into your plant so they can “drive” the equipment.

Some of the security practices we’ve implemented include:

  • SaaS multi-tenant front-end with siloed backend resources
    • One AWS account per tenant

    • Customer data and resources are siloed

    • Firewall inspection North/South, East/West, egress only

  • Zero-trust communications between customer’s cloud and edge devices
    • Securely and remotely manage edge devices (patches and updates)

    • Mitigate against man in the middle (MITM) attacks

    • Encrypted communications from on-premise applications to cloud resources

  • Role-based access control (RBAC)

Liveline has been externally recognized for its cybersecurity practices. We were rated as “mature” status from Plante Moran, and “best practice” by the AWS SaaS Factory team. We are working to achieve full SOC2 compliance within the next 12 months.

On your side

As with many types of technology, the largest security risk for our products is related to physical access. Anyone who can enter your plant and physically access PLCs, production equipment, or on-premise computers can potentially cause harm.

This is no different whether you are using Liveline’s products or not.

We rely on our customers to ensure proper safeguards. This includes restricting physical access to devices, maintaining proper user authentication, and other methods.

Contact us to discuss any questions or concerns.