Log4j: We remain secure

A few days ago, the online world became aware of a security vulnerability in the Java log4j module, which is commonly used in web services around the world. Details about this security flaw are found in across the internet in sites like this.

At Sera4, we took action immediately with a complete security audit of our systems. This notice is meant to help our customers who are doing a security audit. We assure you that Teleporte and Sera4 remains secure and unaffected.

Sera4 does not natively use Java in our technology stack, which is the primary way services are compromised. We identified one internal tool which uses Java and log4j. However, that internal tool is not vulnerable (due to the log4j configuration) and a scan to confirms that security is maintained. 

To our customers, Sera4 confirms:

  1. All of our applications and cloud environment have not been affected by this exploit.
  2. We use one internal tool which relies on log4j; it was not affected by this exploit.  The tool has since been upgraded to 2.17.0 to ensure that future configuration changes do not render the application vulnerable.

To our anyone new to Sera4 and Teleporte, talk to us about how to get started with a keyless access control that is as digitally secure as it is easy-to-use.

Is Your Critical Infrastructure Security “Abysmal”?

recent report published by Sparsh Kulshrestha, Senior Security Analyst at CloudSEK, describes the current state of critical infrastructure security as “abysmal”. And with good reason. Kulshrestha points out that, due to increases in remote work, most security efforts have been focused on IT assets, while critical infrastructure assets have largely been neglected.  

“While most industrial control systems (ICS) have some level of cybersecurity measures in place, human error is one of the leading reasons due to which threat actors are still able to compromise them time and again,” says Kulshrestha. 

In the report, the CloudSEK team identifies some of the most common weaknesses in Operational Technology (OT) which can be exploited by bad actors, including weak or default credentials, outdated software, and infrastructure vulnerabilities. The report references recent cyberattacks on critical infrastructure, including water supply management, gas transport, the Colonial oil pipeline, and the port of Houston. 

The scope of potential damage resulting from these cyberattacks ranged from exposure of sensitive data, to the manipulation of the chemical composition of the public water supply. While the former is embarrassing and bad for business, the latter could be disastrous. 

Part of CloudSEK’s research included scanning the web, and the team discovered “hundreds” of vulnerable ICSs. 

While this research was focused primarily on vulnerabilities in the software used to manage and control critical infrastructure assets, it highlighted that the physical security of the assets must be just as, if not more, abysmal. While organizations have been investing in some degree of cybersecurity to protect ICSs, much of our critical infrastructure—”the backbone of governments and large businesses”, according to CloudSEK—is woefully undersecured, with rudimentary technology, such as traditional locks and keys, or three-digit combinations known by many individuals (including current and former employees and contractors). 

That’s why we’re trying to do something different at Sera4. We believe that critical infrastructure and assets need to be secured to the same, or greater, degree as IT assets, and we’re leveraging best-in-class software design to do it. 

Our access control platform, Teleporte, provides bank-grade security to physical assets. Through Teleporte-enabled access control hardware, including padlocks and unlock controllers, we’re able to eliminate many of the challenges identified in the CloudSEK report, including weak or default credentials, outdated software, and architecture vulnerabilities. 

Teleporte delivers reliable keyless access control and identity management to the critical services and infrastructure we rely on most: telecom, power, utilities, oil and gas, and traffic signals. The cloud-based platform means that it’s continually kept up to date in response to security threats and changing standards, and the fact that it doesn’t rely on existing network infrastructure makes our solution suitable for remote areas, and reduces the risk of network exposure and exploitation. 

We think it’s time to move past the Dark Ages. Literally. With all of our advancements in technology, we’re functionally still using the same technology—mechanical locks and keys—as we did in the 10th century. We can do better,  and we want you to do better. We’re all relying on the critical infrastructure that powers our lives. Let’s work harder to secure it.  

To learn more about Teleporte, visit sera4.com

Mechanical Keys: An Anachronism in 2021?

In 2021, your mobile device is likely the hardest-working item you own. If you left your house with only your mobile device in your pocket, would that stop you from having a productive day? Need to check your bank balance? Use the banking app. Buying a latte? Your mobile wallet can take care of that. Have to show your proof of vaccination? Your proof of insurance? Trade stocks? Turn up the heat in your house? Check to see who’s at your front door? You can do all that, from your phone.  
We have placed so much trust in the devices we carry around in our pockets, and the cloud software that secures them. We often don’t think twice about adding a password to Apple Keychain, or storing the most personal details of our lives on our phones. But for some reason, many are reluctant to place that kind of trust in their mobile device when it comes to keyless access control. 

Traditional keys are an anachronism in today’s digital world. An artifact from the past, we find some kind of comfort in having a metal key in our possession, to protect what’s important to us. As long as we have “the key”, no one else does, and we derive a great amount of security from that knowledge. 

Ring with many keys before keyless access control

In our homes, this might make sense. Most of us can say, with a high degree of confidence, that we know exactly how many keys to our front door exist, and who has them. However, most organizations are experiencing key sprawl, and they don’t even know how widespread it might be. It’s impossible to know how many times keys have been copied, who has them, who’s using them, and why. Organizations traditionally deal with a misplaced key by rekeying locks, at significant expense and inconvenience. It’s easier, people think, to give a key to anyone who needs it, and deal with the consequences of a key getting into the wrong hands, than it is to design an access control system with digital keys and identity management in mind from the beginning. 

Organizations are sacrificing security for convenience every day, with both cyber/information assets, and critical infrastructure. While a lot of effort is put into creating the illusion of compliance protocols, not enough is being put into actually securing assets. We believe that it’s not enough to lock up an asset; organizations must understand who is accessing what, when, and why.  

Access control is about more than securing assets; it’s also about implementing a defensible solution to assure regulatory compliance. Cloud-enabled access control solutions allow organizations to proactively improve operations, generate reliable audit trails, enforce safety protocols, control regulated materials, and defend litigation.  

Before you issue another mechanical key, or rekey a set of locks after an asset has been compromised, stop and think about the real value of that piece of metal. We’re confident that it’s not as valuable as the security and insights to be gained from a robust keyless access control solution. To learn more about our cloud-enabled access control platform, Teleporte, and the supporting locks and controllers, visit us here or connect with us. We’d be happy to explore these ideas with you. 

Modern Cloud Solutions Make On-Premise Deployments Obsolete

In the old days, computer programs ran on a computer. This makes perfect sense in the era where the computer was a standalone machine. The first server applications are the same: they ran on a specific server – a computer in a server room somewhere that was a single point of failure. If there was a power outage, a network outage, a cyber-attack or a fire where that one server was, it was a major crisis. On-premise deployments follow this outdated paradigm.

Modern cloud services are different. Let’s take Teleporte Cloud as an example. We take advantage of the ubiquity of the Internet. We split all the small computing tasks that build the whole service into what are called microservices


Microservices don’t live in just one place. They are distributed and self-healing and adapt to disruptions in network infrastructure. They also exist fairly independent of place: microservices are hosted across the globe and any one of a multitude of identical stateless microservices on the Teleporte network can service a request. It’s not just a routine running on one physical computer anymore. As a Canadian company we serve our clients in Tierra Del Fuego and Malawi with exactly the same high reliability we serve clients in New York. Technically speaking, we operate to a 2N+1 redundancy standard.

Modern network infrastructure also isn’t like it was a decade ago. There isn’t one point of failure or one cable that someone might haphazardly cut with a backhoe. Of course network damage happens from time to time, but with a distributed microservice architecture our users don’t notice as the system adapts around it.

Service Reliability

Proper cloud services design and network monitoring are critical components of a high-reliability solution. At Sera4 we do all the coding and quality assurance for Teleporte Cloud in-house. More importantly, we build our own monitoring tools that ensure network health and service availability. We monitor service availability with this tool, globally and 24/7. 

Sera4's internal network health monitoring tool
Part of Sera4’s internal live network health monitoring dashboard

Of course, a network administrator will need a general connection to the internet to work. Fortunately, these are often redundant with wired, wifi and cellular options to reach the internet. Like any good modern web interface today, we design our admin consoles to work on monitors found in network operations centers and equally on the small screens of our mobile phones. 

Reminder: Teleporte keys work and log activity as usual in case of a network outage.

Perhaps the last major concern is cybersecurity. Modern cloud solutions are definitely more secure (and certainly more carefree) than an on-premise solution. As new threats emerge, our systems update automatically to minimize risk. We keep everything updated to work with new phone models as well.  From DDOS avoidance to load-balancing, we design the solution to be fully resilient.

Of course, we’d love to show off how this can work for you and why you don’t have to worry about racking another server in order to get the best of keyless access control. Request a demo with us to take the next step.

Sera4 Security – Your locks are your locks

When we onboard a new customer, we set up a complete cloud environment for our customer. At Sera4, we can only access to data about your locks, your operations and your users if you explicitly grant us access (sometimes you may choose to do that if you request specific training or support from us. This level of security around user data in the cloud is an industry best practice and is not unique to Sera4. We call each customer’s cloud environment an Organization.

What happens to the locks and controllers on a Teleporte network often gets overlooked by our customers. It is all orchestrated by Sera4 in the background. Each Sera4 lock has firmware that we’ve been developing in-house for years. This firmware includes all the security protocols to reliably and securely communicate with the Teleporte Mobile Application. It also contains a unique digital certificate that we call the Organization Control Code (OCC).

Each active lock and controller has an OCC. This OCC is the same for all locks in an organization. It filters all commands from the Teleporte Mobile Application, so that any requests or instructions that do not come from a matching Organization are ignored. This way no other Teleporte customer can interact with your locks in any way. Only you control your locks. When combined with Teleporte’s off-network architecture, we believe this is the most secure way to secure your assets.

By default, the OCC is setup to be Sera4.  When locks and controllers get moved into a new organization, the OCC is automatically updated to reflect the ownership and control of the hardware. Thanks to the magic of Public Key Cryptography, virtual keys and commands from the Sera4 organization are subsequently ignored by the lock – the new organization is the ultimate master.

Most of our customers never know about the OCC. Sometimes our customers have to change the OCC on their locks. An example when this happens is when one telecom networks’ tower assets are sold to a tower company.  It’s easy within our software to issue the command to update an OCC, but the command needs to come from the users in the right organization. This requires this users to visit each lock to change the OCC. Notably, this can sometimes be inconvenient – but is required to keep your locks secure in the field. Teleporte doesn’t use any secret or master keys.

This month, we are introducing the option for OCC sharing – the ability for organizations to share their OCC with other organizations.  We will be providing the option to customers to give their Sera4 Authorized Integrator access to manage their locks with a second OCC. This means that locks/controllers can be moved between two (or more) organizations without the complication of updating the OCC first.  Changes to the OCC will occur on the next interaction with the lock and as always – command and control of your Sera4 locks happens seamlessly.

To learn more about the OCC sharing option, please reach out to [email protected].

Why Go Keyless?

The challenges associated with lost and stolen physical keys are often top of mind when security teams start thinking about keyless options. However, there are many more benefits to consider if you’re thinking about going keyless.  

Keyless padlock on telecom MNO towerco gate

What do we mean when we say “keyless access control”?  

Obviously, keyless access control solutions don’t require traditional metal keys. But people often refer to access control systems that require a card or fob as “keyless”. While this type of access control solution is becoming more popular, when we say “keyless”, we mean that the solution doesn’t require any physical thing to control access rights: no keys, no access cards, and no fobs. The keys are virtual; digital tokens are stored in mobile devices and automatically transmitted over the air. 

The benefits of going keyless 


Digital keys allow you to control not only who has access to your assets and infrastructure, but when. Concerns about bad actors getting their hands on master keys are alleviated, and there are none of the headaches associated with retrieving keys from departing staff. Virtual keys pair access with identity, so you know exactly who is accessing your sites.  


Securing your assets is important to protect your assets, but it is equally important for the cybersecurity of your network. A keyless access control solution designed with security at the forefront is an order of magnitude more secure than traditional locks and keys. Virtual keys are much harder to duplicate than mechanical keys, and can’t be lost, stolen, or misplaced. And because digital keys are matched to a specific user, people tend to behave better when they know their name is attached to an access event.  


With explosive growth in some sectors, and unprecedented circumstances related to the recent pandemic in others, no one knows what their business will look like one, three, or five years from now. Keyless access control allows you choose whether you want to start with a few test sites or go for your whole network, and then effortlessly scale access with your business. Whether you’re looking to scale with acquisition of assets or employees, or adding more, or more remote sites, to your portfolio, digital keys provide scalability without exponentially compounding operational expenses. Virtual keys future-proof your access control strategy. 

Operational Insights 

Virtual keys, backed by a cloud infrastructure, provide insights into operational processes across your assets and organization. These insights can help refine strategies from everything to resource planning to reconciling billing with contractors. It’s often challenging for operations teams to understand the actual processes being undertaken at remote or satellite sites. Access logs and audit trials provide the intelligence needed to make better business decisions and understand process gaps.   


Keyless access control goes beyond securing your sites and assets. Regulated industries require identity management and the burden of proof falls on organizations to prove regulatory compliance to governing bodies. Keyless access control, backed by a robust cloud solution, allows organizations to create defensible audit trails, safeguard regulated assets and processes, and assure compliance with industry requirements. We envision a world where the access control strategy drives innovation in the areas of regulatory and safety compliance. 

The benefits of cloud 

Most of the benefits of a truly keyless solution are found in the integration with cloud technology. A good cloud implementation makes customer adoption easy.  With a cloud solution, there are no costly servers to install or maintain on-site. The cloud infrastructure manages everything from issuing and revoking keys to the capture and storage of data related to the access control solution.  
As with any cloud solution, you need to make sure that your data is protected and appropriately encrypted. The right partner for your keyless access control solution will put security at the forefront of their platform, and ensure that the software is kept up to date to comply with evolving security standards. 

The benefits of mobile access 

Issuing virtual keys to mobile devices ensures that keys get to the people who need them, when they need them, and for however long they need them. Whether you’re issuing a key to a long-standing employee or a service contractor, to a site in the city, or 500 miles away in the middle of nowhere, the experience is the same. 

Sera4’s keyless solution is powered by Teleporte, a proprietary app which uses multiple methods of authentication to ensure that identity and permissions are verified. These authentication methods provide a more secure, compliant access control solution than traditional locks and keys, and Teleporte is also able to capture attempted accesses, not just successful opens.  

No network? No problem. Teleporte isn’t dependent on live network access. It’s important that users be able to access sites and infrastructure, no matter how remotely located, so the app doesn’t require internet access to open a lock.  

Moving from a point solution to a strategic initiative 

With advancements in keyless technology, and the growth of cloud infrastructure, access control is now considered an integral part of the overall security strategy. Keyless solutions allow the creation of holistic, cohesive access control systems, where the access mechanisms integrate with each other, as well as with existing systems and applications. 

Sera4 provides all the convenience and benefits of a keyless solution without sacrificing security or reliability. Our solutions are purpose-built to provide secure, scalable, and reliable access control across all of your assets and sites, from cabinets and cages to outdoor enclosures. Our hardware is built to withstand the harshest environments, and our software is elegantly designed to manage identity, generate audit trails, prove compliance, and improve operational efficiency.  

While we don’t envision a world without mechanical keys, keyless solutions provide flexibility, scalability, and customization that just isn’t possible with traditional locks and keys. Different industries and sites face different security and access control challenges, whether due to number of access points, number of users, or the remoteness of a site. Cloud-based access control systems can be configured to meet any need.  

To learn more about Sera4 keyless access control solutions, book a demo with our team. 

Powered locks: your key to compliance

We’ve written before about the benefits of keyless access control. Traditional keys create a number of challenges for organizations, from the logistics of getting physical keys to the people who need them, to inherent security flaws, such as unauthorized key use, lost keys, and anonymous access. 

For organizations in regulated industries, these problems are amplified under the scrutiny of regulating bodies. When an organization has compliance requirements, whether due to safety concerns or the nature of what’s being secured, access control systems need to provide another layer of identity assurance. In case of an infraction, suspected or actual, it’s critical that organizations be able to provide a reliable, accurate, and defensible story of who accessed what assets, and when.  

Keyless access control systems are the best way to accomplish this, but not all keyless solutions are created equal. While there are a number of robust keyless solutions, not all provide the features required to maintain compliance and defensibility. Keyless access control solutions fall into two primary categories: bring your own power (BYOP) and embedded power. 

Powered lock adapter

BYOP keyless locks 

Keyless solutions without an embedded power source use energy harvesting techniques, such as Near-Field Communication (NFC), on a mobile device to open the lock. As the power used to open the lock is transferred from the mobile device to the lock, this type of lock is positioned as an environmentally-friendly, low-maintenance solution. 

However, keyless access control solutions without a continuous power source not only cripple some of the key compliance features, but create a security risk for your critical infrastructure. 

Locks without a permanent power source don’t allow for a real-time clock, creating an opportunity for time-based attacks, where hackers attempt to modify keys or access logs by manipulating the time on a mobile device.  

Lack of permanent power also limits the ability to open a lock without a mobile device if needed, such as when the device is out of power or out of coverage, or when end users simply refuse to be tracked by their phones.  

The technology that facilitates the opening, NFC, also isn’t universal. Not all mobile devices are NFC-enabled, and users may find themselves in the inconvenient position of not being able to open a lock. In any case where the manufacturer requires a BYOP approach every time a user goes to open the lock, there is a risk of not being able to access the asset. BYOP is perfectly convenient until it fails, in which case it fails very hard and creates a host of headaches for users and downstream stakeholders. 

While manufacturers of battery-free locks often claim that their solutions are maintenance-free, since batteries don’t need to be replaced, the costs of replacing batteries occasionally is far outweighed by the benefits that come with powered solutions. 

Keyless locks with embedded power 

Like other keyless locks, locks with a continuous power source provide a smooth experience for both administrators and users. Digital keys can be issued, and revoked as needed, to anyone with a mobile device. The challenges that come with mechanical keys are greatly reduced, and the security concerns about unauthorized use or loss of keys are eliminated. 

Moreover, keyless locks with a continuous power source have the ability to store access events, which provide key operational insights and automated audit trails. The battery or wired power source in locks and controllers, not only tracks and stores opens, but also unexpected events and unauthorized access attempts.  

Critics of powered locks will often point to the total cost of ownership (TCO) and additional effort required to maintain these locks, but it’s a weak position. For example, Sera4 padlocks have a low-power design that allow thousands of opens on a single battery. As for additional maintenance visits, the typical battery life of a Sera4 padlock is five years, and it’s trivial to schedule battery replacement or restocking of a battery depot during scheduled asset maintenance. Sera4’s lock controllers are wired to power and maintain their own backup power, so these systems are as carefree as energy-harvesting systems, with no downsides. 

A constant power source also allows for an alternative method to open a lock, which we call Failsafe Unlock. Our padlocks include a micro-USB port to power the lock, if needed, via a portable battery, AC adaptor, or laptop. 

While any keyless solution is better than a mechanical lock for ensuring and tracking compliance, a continuous power source provides the features that organizations need to provide defensibility around their policies, actions, and activities.  

Sera4 works with leading organizations in regulated industries such as telecom and utilities, and we’d love to chat with you about how our armored hardware and proprietary software, Teleporte, can help you be more compliant with your industry’s requirements. To see our solutions in action, book a demo or contact our team

When Subscription Models Make Sense

We encourage anyone buying a product or service to think critically about why it may be sold by subscription. In some cases, the subscription is tied to consumables. In other cases, the subscription is tied to access to content (like streaming services). Sometimes, it’s just a supplier who did the financial calculus and forces it for the shareholder returns.  

subscription screen on tablet - access control

In other cases, such as with our cloud-enabled access control software platform Teleporte, it’s tied to constant updates to keep up with phone models, security updates, and real-time support for your operational peace of mind. We continue to add value over the lifetime of the subscription, and our customers choose us over other solutions because of this added value. 

We believe that our Teleporte subscriptions are valuable for the advanced features that are possible with keyless systems. We also believe that there is far more value for our customers in these systems than the price of the subscription. For customers who agree with this, they will continue with Teleporte Enterprise or Standard.  

For customers who don’t see the value, or customers who simply have budgets cut (like many of our municipal customers did at the start of the pandemic), then we have Teleporte Basic. It’s free, and allows the locks to maintain basic keyless access functionality, but they otherwise behave like mechanical locks, with no reporting and no advanced features. It’s our way of providing assurance that we’re never going to hold you (or your property) hostage. 

We sell new hardware with a minimum one-year Teleporte Enterprise or Standard subscription. We want our customers to have some time with a subscription package to experience the value to their application and organization, and then make an informed decision whether to renew. We also offer packages for customers who prefer to just pay once, up-front.  

Selling a one-time purchase can be easy. Keeping loyal customers, who renew their subscriptions, requires a different level of service, reliability, and product quality. We want our customers to love, value, and renew their Teleporte subscriptions, and we do the work to keep them happy.  

We see good reasons for some offerings to be structured as subscriptions. Ultimately, the decision on whether a subscription is a good value and a smart buy is up to the customer. In our view, it’s really important that the structure and costs of an offering is clearly explained in advance, so that the customer can make an informed decision.  

If you’d like to learn more about Teleporte and our access control hardware solutions, book a demo at https://www.sera4.com/demo/

Sera4 IoT Devices: Designed With Security in Mind

We continue to see security threats affecting IoT devices. In this recent Ars Technica article, they share that a lot of these devices are exposed because they are built with old TCP/IP network stacks that use old security paradigms. That’s one of the risks in using open-source code.  And the risks are really serious – opening back-doors in otherwise secure networks for all sorts of nefarious activity. 

We want to remind people that such attacks aren’t possible on Teleporte-controlled locks. 

  • No TCP/IP stack – we aren’t vulnerable to this specific attack because we don’t use the Internet Protocol 
  • No open-source code – we have designed and implemented ALL embedded code in-house (Canada) 
  • No connectivity to customer networks – there’s no way to open a back door into your network when our devices aren’t even on the network. 

You can continue to rely on Teleporte‘s security because, from the start, we’ve incorporated a security-first approach. While IoT risks in the world are some of the most serious and difficult ones, they don’t have to be if the systems are designed with security in mind. 
Trust in us, as security is our #1 focus, and we’ll continue to deliver secure solutions to the market. 

Cloud Security is Not the Culprit in Recent Cyberattacks

Last week, Silicon Valley-based Internet of Things (IoT) security and surveillance provider Verkada announced a major cyberattack, which allowed hackers to gain access to live feeds and archive video associated with 150,000 cloud-connected devices. Most organizations affected by the attack found out about it when their surveillance imagesincluding footage from inside prisons, hospitals, and software providersstarted circulating online. The attackers were able to gain access to the command-and-control systems of these cameras, which gave them unfettered access to cameras in organizations across the world. 

access control cloud security

Whenever there is a cyberattack of this nature, it leads people to question the security of cloud solutions. However, this shouldn’t cause general fear, uncertainty, or doubt around using systems that have a cloud architecture. A well-designed cloud system is perfectly secure. 

While the details of the compromise are not yet available to the public, there are several hints as to the vulnerabilities of this specific hack, and some key actions enterprise IoT users can take to protect themselves against similar attacks. 

“The attack targeted a Jenkins server used by our support team to perform bulk maintenance operations on customer cameras.” 

A note from CEO Filip Kaliszan, Verkada 

The system was compromised by accessing a vulnerable support server. The fact that a support server has either direct access to the command-and-control of cameras themselves, or the fact that it could be used to penetrate another system with access, suggests vulnerabilities in the vendor’s overall design. Simply, their network infrastructure is not configured with a model of zero trust. Founded by former Forrester Vice-President and Principal Analyst John Kindervag, zero trust is a security framework that reduces the potential for data breaches by removing default trust/access to systems, even those within the firewall. 

“…we have no evidence at this time that this access was used maliciously against our customers’ networks.” 

Filip Kaliszan 

If the IoT device is installed within a corporate network, it’s easy to setup the network so devices don’t have access to anything within the network. VLANs and Layer 2 switching make physical separation of networks easy, and can avoid security concerns. Most hacks are not due to the inherent security of the solution, but the mistakes made in securing it. 
Enterprise IoT customers can also ensure that any connected device coming into the organization is updated from default passcodes or admin passwords. In an interview regarding the Verkada breach with CCTVBuyersGuide, Asaf Hecht, Cyber Research Team Leader from CyberArk commented, “The potential for breaching common IoT devices, like security cameras, is something we’ve been talking about for years. Cameras, much like other hardware devices, are often manufactured with built-in or hard coded passwords that are rarely, if ever, changed by the customer.” 

“While we can’t be sure that’s what happened in this case, recent breaches certainly have ‘scale’ in common, demonstrating attackers’ growing confidence and precision – and ability to efficiently extrapolate weaknesses for impact.” 

Is Sera4’s Teleporte cloud solution for keyless access control safe?

At Sera4, we easily argue that our Teleporte cloud architecture enhances your organization’s security. 

Cloud Security By Design 

Teleporte implements a network design that doesn’t have support servers connected to our private cloud. Teleporte implements its services in independently ISO 27001 managed data centers; there is no dependence or connectivity on support servers in our office. The office is a place to worknot a place we depend on to run our products. 

Teleporte, when implemented in the cloud instead of an enterprise network, means our customers don’t have to worry about compromised systems affecting Teleporte services—and neither do we. Internal enterprise systems, and even your employees, don’t have direct access to the Teleporte servers. 

Finally, Teleporte locks and lock controllers don’t have IP addresses.  They aren’t directly connected to the Internet, and as such can’t be opened en mass by an external hacker. Equally, they could never be taken over to compromise your enterprise network. 

Cloud Security By Experts 

Ultimately, there are many examples of products that operate effectively from the cloud. The best cloud products were built by experts who approach products and solutions with a security first mindset. The Sera4 team is comprised of network, mobile, and embedded experts, and a security first approach is in our DNA. Our solutions were purpose built to provide the most secure, scalable, and reliable keyless access control on the market. Book a demo of our Teleporte solution and you’ll find that the decision is easier to trust than the alternatives.