Security

Data storage & transit security

Data Encryption:

  • All primary visual data and secondary generated data are stored with comprehensive encryption measures. AES-256 encryption is enforced for all databases to secure data at rest.

Secure Communication:

  • Communication between users and the Lumi Platform is secured through HTTPS.

Real-Time Data Encryption:

  • Any data streaming between the Lumi Device and the Lumi Platform or from the Lumi Platform to the user is encrypted using Secure Real Time Protocol (SRTP), coupled with robust encryption key exchange and secure signalling to maintain data confidentiality.

Data Integrity and Leakage Prevention:

  • Data integrity is maintained within Virtual Private Clouds (VPCs) and bridges, ensuring no data leakage. The security architecture is further fortified through the deployment of Hardware Security Modules (HSMs), compliance with FIPS 140-2 standards, utilisation of Hash-Based Message Authentication Code, and the implementation of asymmetric keys.

Data Management Operations:

  • All data management operations, including transfer, processing, and storage, are predominantly conducted within our London, UK servers. There is a strict policy in place to prohibit the movement of data outside of pre-agreed regions unless explicitly specified.

This security policy ensures that all aspects of data storage and transit within the Lumi Platform adhere to stringent encryption and security protocols to safeguard sensitive information against unauthorised access or compromise.

Vulnerability disclosure program

At Lumi Systems, we take security seriously. We welcome reports from security researchers and users who find potential vulnerabilities in our platform.  If you believe you’ve discovered a security issue, please report it to us at security@lumi.systems.

We appreciate your help in keeping our platform safe.

Scope

Our platform is closed to public registration. If you have access or would like to responsibly test our systems, please contact us first. Unauthorised testing or exploitation is not permitted.

Rewards

While we do not operate a formal bug bounty program at this time, we may offer recognition or discretionary rewards for high-impact, well-reported findings.

Safe Harbor

We will not pursue legal action against security researchers who report vulnerabilities in good faith and follow this policy. Thank you for helping us keep Lumi Systems secure.

Reach Industries Trust Center

If you have any other questions regarding our security policies, please visit our Trust Center.

Book a demo

A member of our team will be in touch ASAP.



Download our product sheet

Please enter your details below to download our product sheet PDF. We will also drop you an email with a link to it.