Live
Energy Manager
Operate portfolios with live data
Enterprise-grade controls, ready for your IT checklist. Encryption, access controls, and governance designed for multi-tenant energy portfolios.
Encryption in transit
At-rest security
& SOC Programs
The foundational security layers that power Energy Manager Pro.
All client-service traffic uses HTTPS with modern TLS*. Data at rest is encrypted by Google Cloud (AES-256 by default). *TLS 1.2+; TLS 1.3 where supported.
Fine-grained authorization with Firebase Authentication custom claims enforced by Firestore Security Rules (deny-by-default, least privilege).
Cloud Audit Logs capture admin activity (on by default) and data-access events (when enabled) for Firestore and Functions; logs can be exported to Cloud Storage, BigQuery, or your SIEM.
We follow a zero-trust model consistent with Google Cloud BeyondCorp, where every request is verified for identity, context, and device integrity.
Firebase services participate in Google Cloud's ISO 27001, 27017, 27018, and SOC 1/2/3 programs; reports are available via Google.
User and facility data are minimized, encrypted, and never sold. Processing is based on contractual necessity, legitimate interest, and user consent as described in our Privacy Policy.
The platforms and tools powering our security infrastructure.
Google Cloud Infrastructure : Built on Firebase/Google Cloud with regional deployment options (Doha, Dammam, EU, US multi-regions) for compliance and performance.
Custom Encryption Keys (CMEK) : Optional customer-managed keys for Firestore at-rest encryption, available for enterprise clients on request. Gives you control over key management and rotation policies.
Cloud Functions for Privileged Operations : Sensitive server-side operations (billing calculations, report generation) run in isolated Cloud Functions, never in client code.
Firebase App Check : Attestation-based client validation to block requests from untrusted or compromised devices, preventing abuse and unauthorized access.
Cloud Logging & Monitoring : Real-time logging, metrics collection, and alert rules to detect anomalies; integrates with your SIEM for centralized security monitoring.
Backup & Point-in-Time Recovery (PITR) : Automated daily/weekly Firestore backups (up to 14 weeks retention) plus 7-day PITR for rapid incident recovery without data loss.
End-to-end data flow with security applied at every layer.
Multi-source
Utility Bills: CSV · PDF · APIs
IoT & BMS: BACnet · Modbus · MQTT
Processing: OCR · Validators · QC
Firestore
End-to-end encrypted with optional CMEK; multi-region replication; compliance-ready infrastructure
Controlled & audited
Analytics: Forecast · Alerts · Reports
Security: RBAC · Audit logs · SSO
End-to-end security: TLS encryption · At-rest encryption · Token auth · IP allowlists · Audit trail
How data moves through Energy Manager with encryption and controls.
Answers to common questions about our security implementation.
On Google Cloud (via Firebase) in the region we select at setup (e.g., me-central1 Doha, me-central2 Dammam, or EU/US multi-regions). We can provide your project's exact region on request.
We use Firestore's managed scheduled backups (daily/weekly; up to 14 weeks retention) and also enable PITR (7 days) for surgical restores. Exact schedules/retention can be shared in our DPA/SLA.
Yes—via Firebase Authentication with Identity Platform (upgrade), which adds enterprise SAML/OIDC identity provider support.
Only the minimum business contact data required for platform access (Auth). Utility data is treated as confidential and governed by roles and rules.
We run ongoing code reviews, logging/alerting, and configuration checks aligned with Google's Firebase Security Checklist. Third-party penetration tests are available on request through an authorized third-party provider.
Start a guided free trial or book a live demo to see how EnergyManager Pro adapts to your portfolio.
Like most of Dubai, we're building something special! We rely on your feedback to test and help us accelerate the development of our website and app.