Enterprise Security

Security

Enterprise-grade controls, ready for your IT checklist. Encryption, access controls, and governance designed for multi-tenant energy portfolios.

Standard
TLS*

Encryption in transit

Encryption
AES-256

At-rest security

Compliance
ISO 27001

& SOC Programs

Core highlights

The foundational security layers that power Energy Manager Pro.

Encryption in transit & at rest

All client-service traffic uses HTTPS with modern TLS*. Data at rest is encrypted by Google Cloud (AES-256 by default). *TLS 1.2+; TLS 1.3 where supported.

Role-based access control (RBAC)

Fine-grained authorization with Firebase Authentication custom claims enforced by Firestore Security Rules (deny-by-default, least privilege).

Auditability

Cloud Audit Logs capture admin activity (on by default) and data-access events (when enabled) for Firestore and Functions; logs can be exported to Cloud Storage, BigQuery, or your SIEM.

Zero-trust posture

We follow a zero-trust model consistent with Google Cloud BeyondCorp, where every request is verified for identity, context, and device integrity.

Compliance-ready

Firebase services participate in Google Cloud's ISO 27001, 27017, 27018, and SOC 1/2/3 programs; reports are available via Google.

Privacy by Design

User and facility data are minimized, encrypted, and never sold. Processing is based on contractual necessity, legitimate interest, and user consent as described in our Privacy Policy.

Technical details

The platforms and tools powering our security infrastructure.

Google Cloud Infrastructure : Built on Firebase/Google Cloud with regional deployment options (Doha, Dammam, EU, US multi-regions) for compliance and performance.

Custom Encryption Keys (CMEK) : Optional customer-managed keys for Firestore at-rest encryption, available for enterprise clients on request. Gives you control over key management and rotation policies.

Cloud Functions for Privileged Operations : Sensitive server-side operations (billing calculations, report generation) run in isolated Cloud Functions, never in client code.

Firebase App Check : Attestation-based client validation to block requests from untrusted or compromised devices, preventing abuse and unauthorized access.

Cloud Logging & Monitoring : Real-time logging, metrics collection, and alert rules to detect anomalies; integrates with your SIEM for centralized security monitoring.

Backup & Point-in-Time Recovery (PITR) : Automated daily/weekly Firestore backups (up to 14 weeks retention) plus 7-day PITR for rapid incident recovery without data loss.

Platform scope

End-to-end data flow with security applied at every layer.

Ingestion

Multi-source

Utility Bills: CSV · PDF · APIs

IoT & BMS: BACnet · Modbus · MQTT

Processing: OCR · Validators · QC

Storage

Firestore

End-to-end encrypted with optional CMEK; multi-region replication; compliance-ready infrastructure

Access

Controlled & audited

Analytics: Forecast · Alerts · Reports

Security: RBAC · Audit logs · SSO

End-to-end security: TLS encryption · At-rest encryption · Token auth · IP allowlists · Audit trail

Data flow

How data moves through Energy Manager with encryption and controls.

Utility Bills CSV · PDF · APIs IoT & BMS BACnet · Modbus · MQTT Ingestion Layer OCR · Validators · QC rules Data Lake (AES-256) Encrypted at rest Analytics Engine Forecast · Alerts · Reporting Role-based access · Audit logging

Security FAQ

Answers to common questions about our security implementation.

Where is data hosted?

On Google Cloud (via Firebase) in the region we select at setup (e.g., me-central1 Doha, me-central2 Dammam, or EU/US multi-regions). We can provide your project's exact region on request.

How often do you back up data?

We use Firestore's managed scheduled backups (daily/weekly; up to 14 weeks retention) and also enable PITR (7 days) for surgical restores. Exact schedules/retention can be shared in our DPA/SLA.

Do you support SSO (SAML/OIDC)?

Yes—via Firebase Authentication with Identity Platform (upgrade), which adds enterprise SAML/OIDC identity provider support.

Do you process PII?

Only the minimum business contact data required for platform access (Auth). Utility data is treated as confidential and governed by roles and rules.

Pen-testing cadence?

We run ongoing code reviews, logging/alerting, and configuration checks aligned with Google's Firebase Security Checklist. Third-party penetration tests are available on request through an authorized third-party provider.

Ready to unlock your next 20% in savings?

Start a guided free trial or book a live demo to see how EnergyManager Pro adapts to your portfolio.

Habibi, we are under construction

Like most of Dubai, we're building something special! We rely on your feedback to test and help us accelerate the development of our website and app.