Your Fleet Data.
Protected at Every Layer.
Enterprise fleet operations depend on data that is accurate, available, and protected. AjnaView is built from the ground up with security as a core requirement — not an afterthought.
Your Data Stays Where You Need It
We offer dedicated data residency options so your fleet data is stored and processed within your required jurisdiction — critical for regulated industries and multinational operations.
Africa deployments are handled via nearest compliant region by default. Custom arrangements available on request.
- Standard contractual clauses for cross-border transfers
- Data processing agreement (DPA) available on request
- Dedicated data controller contact for enterprise accounts
- Audit logs available for all data access and exports
- Right to erasure and data portability fully supported
- Sub-processor list maintained and disclosed on request
Defence in Depth
Multiple independent security layers protect your data at rest, in transit, and in use.
Encryption at Rest & In Transit
All data is encrypted using AES-256 at rest and TLS 1.3 in transit. Database encryption is applied at the volume level with rotating keys managed via a dedicated key management service.
Role-Based Access Control
Granular permission sets allow you to define exactly what each user can see and do — by depot, vehicle group, report type, or feature. Full audit trail of every access event.
Continuous Monitoring
24/7 infrastructure monitoring with automated anomaly detection, intrusion detection systems (IDS), and real-time alerting for any unusual access patterns or system events.
Isolated Customer Environments
Enterprise customers receive logically isolated environments. Your data is never co-mingled with other customers' data at the database or application layer.
Automated Backups & Recovery
Point-in-time recovery with automated backups every 6 hours. Backup data is encrypted and stored in a separate geographic region. RTO under 4 hours, RPO under 6 hours.
Vulnerability Management
Regular penetration testing by independent security firms. Automated dependency scanning on every deployment. Responsible disclosure program with a defined SLA for remediation.
Employee Access Controls
Principle of least privilege applied to all staff. Background checks for all personnel with production access. MFA enforced for all internal systems. Access reviewed quarterly.
API Security
OAuth 2.0 authentication, rate limiting, IP allowlisting, and signed webhook payloads. All API calls are logged with full request metadata for audit purposes.
Infrastructure Security
Hosted on enterprise-grade cloud infrastructure with SOC 2 Type II certified providers. Network segmentation, WAF, and DDoS protection applied at the perimeter.
Built for Operations That Can't Afford Downtime
Fleet operations run 24/7. Our infrastructure is designed for the same — with redundant systems, automatic failover, and a contractual uptime commitment backed by service credits.
Contractual commitment with service credits if we fall short. Planned maintenance scheduled outside peak hours with advance notice.
Multi-region active-passive architecture. If a primary region becomes unavailable, traffic automatically routes to standby within minutes.
Enterprise customers receive direct notification for any incident affecting their services.
You Control Who Sees What
Granular access controls ensure every user sees only what they need — nothing more.
Role-Based Permissions
Define roles by depot, vehicle group, report type, or module. Roles are fully customisable per account.
SSO / SAML Support
Enterprise accounts can authenticate via your existing identity provider — Microsoft Entra, Okta, Google Workspace.
MFA Enforcement
Multi-factor authentication can be enforced for all users in your organization — mandatory for admin accounts.
Full Audit Trail
Every login, report download, vehicle command, and configuration change is logged with timestamp and IP address.
Need a Security Review?
Enterprise procurement teams can request a detailed security questionnaire, data processing agreement, or a call with our technical team to discuss specific requirements.