IT approved network security.
We made security a C.O.R.E part of the Pelican solution.
IT approved network security.
We made security a C.O.R.E part of the Pelican solution.
We focused on providing a solution that comfortably sits within your existing network environment.
| Enterprise level security built directly into the solution.
Outbound Only Connection.
128-bit (AES) Encryption Standards.
No backdoor or open architecture operating systems.
In country cloud servers with single-point private connections.
Privatized cloud servers isolating data storage and communication.
Autonomous wireless networking.
Complex passwords and two-factor authentication options.
We focused on providing a solution that comfortably sits within your existing network environment.
| Enterprise level security built directly into the solution.
Outbound Only Connection.
128-bit (AES) Encryption Standards
No backdoor or open architecture operating systems.
In country cloud servers with single-point private connections.
Privatized cloud servers isolating data storage and communication.
Autonomous wireless networking.
Complex passwords and two-factor authentication options.
| Tailored to exceed your network security needs.
C.O.R.E stands for:
CREATE
Enforce automated networking to eliminate human error.
ORGANIZE
Structure for reliable connections with zero vulnerability and minimal latency.
RESTRICT
Hard-coded preventative measures for a retained isolation architecture.
ENCRYPT
Shield and key protected communications from data-point to data-point.
| Tailored to exceed your network security needs.
C.O.R.E stands for:
CREATE
Enforce automated networking to eliminate human error.
ORGANIZE
Structure for reliable connections with zero vulnerability and minimal latency.
RESTRICT
Hard-coded preventative measures for a retained isolation architecture.
ENCRYPT
Shield and key protected communications from data-point to data-point.
| Create an isolated and secure structured network.
| Create an isolated and secure structured network.
CREATE: Automated Networking
We made installing Pelican simple. Your private Pelican cloud server (your Pelican Connect™ app) and the on-site Pelican wireless mesh network are both established automatically using our secure networked and wireless architecture. This allows for end-to-end reliable and fast connections.
CREATE: Address Management
Each device is auto-assigned an address on the Pelican network. This reduces misconfiguration and errors in the network communication architecture. It also enforces only Pelican-built device's ability to establish network links.
CREATE: Optimized Wireless Networking
As Pelican devices are installed at your facility, they auto-connect to the private Pelican wireless mesh network (no connection to WiFi required). This allows Pelican devices to go through a factory hard-coded security identification and approval process, while removing the need for devices to connect to your private business network.
CREATE: Pelican App & MySites
Once Pelican is installed at your property, your Pelican Connect™ app is automatically created on a private virtual cloud server. This isolates your data from other Pelican customers (they also have their own private virtual cloud server). Access into your app is managed through email and password identification with the ability to enforce two-factor authentication and/or complex password requirements.
When it comes to network creation, the Pelican solution is completely automated. This eliminates the potential for human error when addresses, encryption keys, and network paths are created.
CREATE: Automated Networking
We made installing Pelican simple. Your private Pelican cloud server (your Pelican Connect™ app) and the on-site Pelican wireless mesh network are both established automatically using our secure networked and wireless architecture. This allows for end-to-end reliable and fast connections.
CREATE: Address Management
Each device is auto-assigned an address on the Pelican network. This reduces misconfiguration and errors in the network communication architecture. It also enforces only Pelican-built device's ability to establish network links.
CREATE: Optimized Wireless Networking
As Pelican devices are installed at your facility, they auto-connect to the private Pelican wireless mesh network (no connection to WiFi required). This allows Pelican devices to go through a factory hard-coded security identification and approval process, while removing the need for devices to connect to your private business network.
CREATE: Pelican App & MySites
Once Pelican is installed at your property, your Pelican Connect™ app is automatically created on a private virtual cloud server. This isolates your data from other Pelican customers (they also have their own private virtual cloud server). Access into your app is managed through email and password identification with the ability to enforce two-factor authentication and/or complex password requirements.
| Create an isolated and secure structured network.
When it comes to network creation, the Pelican solution is completely automated. This eliminates the potential for human error when addresses, encryption keys, and network paths are created.
When it comes to network creation, the Pelican solution is completely automated. This eliminates the potential for human error when addresses, encryption keys, and network paths are created.
We made installing Pelican simple. Your private Pelican cloud server (your Pelican Connect™ app) and the on-site Pelican wireless mesh network are both established automatically using our secure networked and wireless architecture. This allows for end-to-end reliable and fast connections.
Each device is auto-assigned an address on the Pelican network. This reduces misconfiguration and errors in the network communication architecture. It also enforces only Pelican-built device’s ability to establish network links.
As Pelican devices are installed at your facility, they auto-connect to the private Pelican wireless mesh network (no connection to WiFi required). This allows Pelican devices to go through a factory hard-coded security identification and approval process, while removing the need for devices to connect to your private business network.
Once Pelican is installed at your property, your Pelican Connect™ app is automatically created on a private virtual cloud server. This isolates your data from other Pelican customers (they also have their own private virtual cloud server). Access into your app is managed through email and password identification with the ability to enforce two-factor authentication and/or complex password requirements.
| Organize the network for low latency and retained security.
A properly organized solution (from your Pelican private cloud server to your private Pelican Connect™ app to each installed Pelican device) helps guarantee no weak points across the solution. Data center locations, cloud server creation, network addresses, wireless paths, and all other data communications are automated. This insures both heightened security and fast network speeds.
| Organize the network for low latency and retained security.
A properly organized solution (from your Pelican private cloud server to your private Pelican Connect™ app to each installed Pelican device) helps guarantee no weak points across the solution. Data center locations, cloud server creation, network addresses, wireless paths, and all other data communications are automated. This insures both heightened security and fast network speeds.
| Restrict all communication to only Pelican authenticated devices.
RESTRICT: Pelican App Access
Access into your Pelican Connect™ app is managed through authenticated email and password requirements.
To enhance access security control, Pelican also provides complex password and two-factory authentication login options.
RESTRICT: Data Storage
No two Pelican customer's data sits on the same virtual server.
This enforces the isolation architecture for all network connections and data storage.
RESTRICT: Gateway Connection
A Pelican Gateway is just a bridge between the on-site Pelican Wireless Network and the connection to your Private Virtual Server.
It is not a server and it does not run any form of open-source operating system.
The Gateway establishes an out-bound connection to your private cloud server. Data remains secure from the server to the end-device.
RESTRICT: Wireless Isolation
Pelican's uses the 802.15.4 wireless standard. This network standard is designed to co-exist with 802.11 (WiFi) and other 802.15.4 devices, without any interconnectivity or interference. Taking it one step further, Pelican communicates on a channel in the 802.15.4 wireless standard that WiFi is not even allowed to be in.
This keeps Pelican 100% isolated from your private business network.
An isolated architecture is the most secure. The Pelican solution has built-in restrictions to keep its network isolated from other public and private networks.
| Restrict all communication to only Pelican authenticated devices.
Access into your Pelican Connect™ app is managed through authenticated email and password requirements.
To enhance access security control, Pelican also provides complex password and two-factory authentication login options.
No two Pelican customer’s data sits on the same virtual server.
This enforces the isolation architecture for all network connections and data storage.
A Pelican Gateway is just a bridge between the on-site Pelican Wireless Network and the connection to your Private Virtual Server.
It is not a server and it does not run any form of open-source operating system.
The Gateway establishes an out-bound connection to your private cloud server. Data remains protected from the server to the end-device.
Pelican’s uses the 802.15.4 wireless standard. This network standard is designed to co-exist with 802.11 (WiFi) and other 802.15.4 devices, without any interconnectivity or interference. Taking it one step further, Pelican communicates on a channel in the 802.15.4 wireless standard that WiFi is not even allowed to be in.
This keeps Pelican 100% isolated from your private business network.
| Encrypted end-to-end data transfer.
Authorized network communication only.
FACTORY ENCODED
All Pelican hardware is manufactured, software programmed, and tested in our manufacturing facilities in California. Only devices we manufacturer can communicate with the Pelican network.
128-BIT (AES) ENCRYPTION
All data is secured using Advanced Encryption Standard (AES) 128-bit encryption. Data is protected from each Pelican device installed at your facility all the way to your private cloud server.
ENFORCED KEY ROTATION
Unique security keys are used to provide strong network verification and secure communication paths between your Pelican devices and your cloud server. Automated key rotations occur to keep data protected. Key rotations can also occur upon request.
VPN CONNECTIONS
Your Pelican Gateway establishes a single TCP/IP Virtual Private Network (VPN) connecting with your private cloud server across a secure connection. This protects the privacy and integrity of data and prevents man-in-the-middle attacks.
| Encrypted end-to-end data transfer.
Authorized network communication only.
FACTORY ENCODED
All Pelican hardware is manufactured, software programmed, and tested in our manufacturing facilities in California. Only devices we manufacturer can communicate with the Pelican network.
128-BIT (AES) ENCRYPTION
All data is encrypted using Advanced Encryption Standard (AES) 128-bit encryption. Data is protected from each Pelican device installed at your facility all the way to your private cloud server.
ENFORCED KEY ROTATION
Unique security keys are used to provide strong network verification and secure communication paths between your Pelican devices and your cloud server. Automated key rotations occur to keep data protected. Key rotations can also occur upon request.
VPN CONNECTIONS
Your Pelican Gateway establishes a single TCP/IP Virtual Private Network (VPN) connecting with your private cloud server across a secure connection. This protects the privacy and integrity of data and prevents man-in-the-middle attacks.
| Outbound Port Only.
The Pelican solution establishes a single outbound only, secure connection, to your private Pelican cloud server. No Inbound firewall rules required.
Diagnostic and Troubleshooting.
UDP PORT
514
Establish/Verify Gateway's Primary Data Connection.
TCP PORT
9742
The Gateway is assigned a single outbound port in this range to connect to its private cloud server. This is dynamically assigned during installation and remains fixed to a specific IP address and port to allow IT departments to maintain best practices for firewall management.
TCP PORT
9800-11000
| Outbound Port Only.
The Pelican solution establishes an outbound only, secure connection, to your private Pelican cloud server. No Inbound firewall rules required.
UDP PORT 514
Diagnostic and Troubleshooting.
TCP PORT 9742
Establish/Verify Gateway's Primary Data Connection.
TCP PORT
9800 -11000
The Gateway is assigned a single outbound port in this range to connect to its private cloud server. This is dynamically assigned during installation and remains fixed to a specific IP address and port to allow IT departments to maintain best practices for firewall management.
| Outbound Port Only.
The Pelican solution establishes an outbound only, secure connection, to your private Pelican cloud server. No Inbound firewall rules required.
UDP PORT 514
Diagnostic and Troubleshooting.
TCP PORT 9742
Establish/Verify Gateway's Primary Data Connection.
TCP PORT
9800 -11000
The Gateway is assigned a single outbound port in this range to connect to its private cloud server. This is dynamically assigned during installation and remains fixed to a specific IP address and port to allow IT departments to maintain best practices for firewall management.
Our Mission
Strip away complexity and create climate management simplicity. We exist to make indoor comfort obtainable no matter your commercial footprint.
Why? Because maintaining comfort should not be complex or expensive. And we believe you deserve to be in control.
Get In Touch
Our Mission
Strip away complexity and create climate management simplicity. We exist to make indoor comfort obtainable no matter your commercial footprint.
Why? Because maintaining comfort should not be complex or expensive. And we believe you deserve to be in control.
Get In Touch
Our Mission
Strip away complexity and create climate management simplicity. We exist to make indoor comfort obtainable no matter your commercial footprint.
Why? Because maintaining comfort should not be complex or expensive. And we believe you deserve to be in control.