Security & Compliance

Your battery data, secured.

Data security isn't an afterthought, it's the foundation Voltaiq is built upon.  

Trusted by global industry leaders and Fortune 500 companies, Voltaiq adheres to the most rigorous security standards. Our security-first approach ensures the safest environment for you to collaborate with your team and external partners on critical battery quality data.

Security at a glance.

  • Your battery data is always under your full control
  • You have full administrative control over data visibility and access
  • Your data is encrypted at rest and in flight
  • Your data backups are also encrypted
  • Authorized users can access Voltaiq via any modern browser over HTTPS

    Regardless of your hosting environment, your data is never visible or accessible by Voltaiq staff without your express permission. 

Black and blue gradient shield with a key
Move fast, stay secure

Security Standards and Practices

Voltaiq is compliant with all regulations necessary for a secure cloud analytics platform, designed to easily integrate with your current infrastructure. We have worked with and satisfied the compliance and security requirements of leading OEMs, battery companies and software partners, including global automakers and AWS.

Security and Reliability

Voltaiq offers many security features including SAML SSO, robust authentication, and role-based access controls.

add remove
Voltaiq_Pictogram_artboards white-31

Security and Reliability

Voltaiq offers many security features including SAML SSO, robust authentication, and role-based access controls. All these security features are paired with the most secure application model for day-to-day usage by your end users. 

Voltaiq customers have control over sharing, downloading, and access permissions at the admin level—ensuring your data remains secure.

Cloud Security

Built on the foundations of SOC 2, ITAR, GDPR, and AWS security best practices.

add remove
private

Cloud Security

Voltaiq’s security program and its supporting security architecture are built on the foundations of SOC 2, ITAR, GDPR, and AWS security best practices. 

The full Voltaiq software stack undergoes regular penetration testing to ensure ongoing security.

Compliance

Voltaiq has successfully completed a SOC 2 type 2 audit. 

add remove
Security Compliance

Compliance

Voltaiq has successfully completed a SOC 2 type 2 audit. 

We are committed to protecting your intellectual property and battery data and continue to maintain SOC 2 standards. We make continual improvements in accordance with the latest industry standards and best practices.

Fit and function

Designed to fit with your
existing systems.

Voltaiq has an extensive set of pre-built integrations that cover the equipment and tools your teams are using, with an API that enables flexible custom integrations.

NOVONIX Logo
MACCOR Logo
Arbin Logo
Chroma Logo
Biologic Logo
AWS Logo
Siemens Logo
Thermo Fisher Logo
SAP Logo
PDF Solutions Logo
Alchemy Logo
Monolith Logo
MathWorks Logo
Batemo Logo
Citrine Logo

Frequently Asked Questions

Trusted by global industry leaders and Fortune 500 companies, Voltaiq adheres to the most rigorous security standards. 

What security certifications does Voltaiq hold?

Voltaiq has a SOC2 Type II Certificate which we renew annually and are happy to provide a copy upon request.

How does Voltaiq control access to customer information?

At Voltaiq, we prioritize the security and privacy of your data. Access to customer data is strictly limited to authorized Voltaiq personnel who are directly involved in servicing your account or maintaining our infrastructure. We do not view, access, or use customer data unless it is absolutely necessary to address a specific customer request or resolve an issue. Your trust is our top priority, and we are committed to upholding the highest standards of data protection.

How is my company’s data segmented from other client data?

Every Voltaiq customer system is deployed in its own Virtual Private Cloud, with all data encrypted in flight and at rest. No computing resources are shared across customer systems, data storage or otherwise.

Has Voltaiq ever been subject to a security breach?

No, Voltaiq has never been subject to a security breach.

What policies and agreements does Voltaiq have in place with and/or for employees to protect customer information?

Voltaiq has a suite of information security policies including Acceptable/Technology Use, Data Classification and its General Security policy regarding security measures to protect customer and company information; and procedures regarding handling such information. 

Employee access to customer data is limited to only those team members involved with launching, maintaining, and servicing a customer account, and data is only accessed as required to perform one of these functions.

Employees must acknowledge our information security policies and employee handbook, and sign legal agreements including a confidentiality agreement. Voltaiq performs background checks on all new hires, in addition to requiring completion of information security training upon hiring and annually thereafter.

What does Voltaiq offer for redundancy/backups of data?

Voltaiq's cloud environment features both redundancy within a data center, and the ability to restore (disaster recovery) in a separate cloud availability region. Backups, encrypted-at-rest are stored in an alternate region. In addition to processed data stored in the Voltaiq system, Voltaiq also retains a cloud backup of all original "raw" battery tester data files.

What type of Admin rights would we have in the Voltaiq Platform?

Adding/managing/deactivating user accounts
Voltaiq customers have full control over adding/managing/deactivating their user accounts. We have robust permissions structures that allow for many variable scenarios of data access and permissions. Single sign on (SSO) can also be configured so that deactivation occurs automatically with a company's SSO managed credentials.

Administrative functions
Administrators of the software on the customer side have full access to user permissions, data permissions, analytics permissions etc.

Sharing data
Link sharing of any data is restricted to the permissions of the user receiving the data, users that do not have permissions to view data cannot do so through any links or any other means.

Access to classified information
Permissioning can be easily set up which puts data into classified categories, allowing only access for users with correct credentials.

Password requirements
Password requirements are set by the customer's organization, however we strongly recommend our customers follow best practices which involve long randomized passwords and scheduled password changes. Single sign on (SSO) is supported.

How will our data be handled by Voltaiq at the conclusion of our engagement?

Voltaiq deletes customer data along with the customer instance and VPC upon conclusion of our commercial engagement unless otherwise directed by the customer.

Icon

Better business decisions start with a better understanding of your batteries.

Ready to get started?