Security & Trust

Your Fleet Data.
Protected at Every Layer.

Enterprise fleet operations depend on data that is accurate, available, and protected. AjnaView is built from the ground up with security as a core requirement — not an afterthought.

99.9%
Uptime SLA
AES-256
Encryption standard
4
Data residency regions
24/7
Infrastructure monitoring
Data Residency

Your Data Stays Where You Need It

We offer dedicated data residency options so your fleet data is stored and processed within your required jurisdiction — critical for regulated industries and multinational operations.

🇬🇧
United Kingdom
GDPR & UK DPA compliant
🇪🇺
European Union
ISO 27001 certified facilities
🇺🇸
United States
SOC 2 Type II infrastructure
🇮🇳
India
DPDP Act 2023 compliant

Africa deployments are handled via nearest compliant region by default. Custom arrangements available on request.

Data Processing Agreement
Available for all enterprise customers
  • Standard contractual clauses for cross-border transfers
  • Data processing agreement (DPA) available on request
  • Dedicated data controller contact for enterprise accounts
  • Audit logs available for all data access and exports
  • Right to erasure and data portability fully supported
  • Sub-processor list maintained and disclosed on request
Security Architecture

Defence in Depth

Multiple independent security layers protect your data at rest, in transit, and in use.

Encryption at Rest & In Transit

All data is encrypted using AES-256 at rest and TLS 1.3 in transit. Database encryption is applied at the volume level with rotating keys managed via a dedicated key management service.

Role-Based Access Control

Granular permission sets allow you to define exactly what each user can see and do — by depot, vehicle group, report type, or feature. Full audit trail of every access event.

Continuous Monitoring

24/7 infrastructure monitoring with automated anomaly detection, intrusion detection systems (IDS), and real-time alerting for any unusual access patterns or system events.

Isolated Customer Environments

Enterprise customers receive logically isolated environments. Your data is never co-mingled with other customers' data at the database or application layer.

Automated Backups & Recovery

Point-in-time recovery with automated backups every 6 hours. Backup data is encrypted and stored in a separate geographic region. RTO under 4 hours, RPO under 6 hours.

Vulnerability Management

Regular penetration testing by independent security firms. Automated dependency scanning on every deployment. Responsible disclosure program with a defined SLA for remediation.

Employee Access Controls

Principle of least privilege applied to all staff. Background checks for all personnel with production access. MFA enforced for all internal systems. Access reviewed quarterly.

API Security

OAuth 2.0 authentication, rate limiting, IP allowlisting, and signed webhook payloads. All API calls are logged with full request metadata for audit purposes.

Infrastructure Security

Hosted on enterprise-grade cloud infrastructure with SOC 2 Type II certified providers. Network segmentation, WAF, and DDoS protection applied at the perimeter.

Reliability

Built for Operations That Can't Afford Downtime

Fleet operations run 24/7. Our infrastructure is designed for the same — with redundant systems, automatic failover, and a contractual uptime commitment backed by service credits.

99.9% Uptime SLA

Contractual commitment with service credits if we fall short. Planned maintenance scheduled outside peak hours with advance notice.

Automatic Failover

Multi-region active-passive architecture. If a primary region becomes unavailable, traffic automatically routes to standby within minutes.

Proactive Incident Communication

Enterprise customers receive direct notification for any incident affecting their services.

Access & Identity

You Control Who Sees What

Granular access controls ensure every user sees only what they need — nothing more.

Role-Based Permissions

Define roles by depot, vehicle group, report type, or module. Roles are fully customisable per account.

SSO / SAML Support

Enterprise accounts can authenticate via your existing identity provider — Microsoft Entra, Okta, Google Workspace.

MFA Enforcement

Multi-factor authentication can be enforced for all users in your organization — mandatory for admin accounts.

Full Audit Trail

Every login, report download, vehicle command, and configuration change is logged with timestamp and IP address.

Need a Security Review?

Enterprise procurement teams can request a detailed security questionnaire, data processing agreement, or a call with our technical team to discuss specific requirements.