Process
Unsere Cyber-Hedgehog-Plattform umfasst den Prozess der Datenaufnahme unterschiedlichster Sensoren durch unseren EdgeCOM. Dieser verarbeitet und leitet die Informationen datenschutzkonform, sicher und umweltschonend an den Server weiter. Auf dem Server werden die Daten gespeichert und können auf unserem Portal visualisiert werden.
Edge Computing
Local data processing is the future!
Beim Edge Computing erfasst und verarbeitet ein Computer vor Ort im Netzwerk, beispielsweise an Leuchten, Umwelt-, Verkehrs- und Lichtdaten. Durch die lokale Verarbeitung werden Echtzeitanwendungen realisiert und lediglich geringe Mengen an Daten unter Berücksichtigung des Datenschutzes weitergeleitet.
efficient
energy saving
low data volumes
Highest security for your protection
Our Cyber Hedgehog platform is designed to provide maximum security. With a wide range of security features, we set the standard for protecting your sensitive data:
- an extra secured area (Trustzone) directly on the EdgeCOM protects sensitive data from unauthorized access,
- encryption/decryption prevents software and data from being tapped or manipulated,
- only authorized and signed software will run on your EdgeCOM,
- Secure Boot: bei jedem Neustart des Gerätes wird das Gerät auf Kompromittierung der Software überprüft und ausschließlich unveränderte Software gestartet und
- eine fest integrierter Speicher (eMMC-Speicher) verhindert die einfache Entnahme und somit den Diebstahl oder Austausch der Betriebssoftware.
One gateway for everything
The EdgeCOM is characterized by its multiple connection options, which allow a wide range of sensors and applications to be combined. These include:
- PoE
- RS485
- USB
- Ethernet
- LTE/5G, Wifi und Bluetooth
- GPS
With this series of connections we offer you the flexibilityto seamlessly integrate a wide variety of devices and technologies. Due to the variety of connections, multiple sensors can be connected to one EdgeCOM. It thus combines many conventional gateways into one and contributes to sustainability .


Maximum Performance
The EdgeCOM enables data to be processed locally and results to be transmitted in a resource-efficient manner. It also enables prioritization of real-time applications and machine learning. With our platform, powerful capabilities are available to take your applications to the next level.


The next generation of gateways
Compared to conventional gateways, the EdgeCOM offers a number of key advantages that take our applications to a new level. With our advanced features, we set the standard for industry-standard performance, security and quality.
- Higher Cyber Security
- Greater capacity to act
- Higher quality in industry standard
- Fewer hardware components (gateways) required
With our EdgeCOM, you benefit from more cost-effective, resource-efficient, lower-maintenance and more stable solutions compared to conventional gateways. Our platform provides you with the necessary features to run your applications efficiently and securely.
Feel free to contact us to learn more!
Server-Architecture
Data transfer securely from A to B
For the reliable transmission of data from the EdgeCOM to a defined server, we use M2M SIM cards in combination with an access-restricted SSH procedure (secure shell). SSH provides an encrypted connection between the EdgeCOM and the server, protecting your data from unauthorized access and ensuring the security of the transmitted information. In addition, SCF ensures the following general conditions as part of the cyber security concept:
- firmly defined point-to-point communication
- Up-to-date authentication & encryption method with one random & automatic key exchange per connection between device and server and between devices
Flexible server-architecture for any application
To ensure a high level of security for the stored data, SCF's cyber hedgehog concept prevents devices from accessing the database directly. Containers are interposed in each case to create another "security wall" and make access more difficult.
The state-of-the-art, maintained container architecture makes it possible to react flexibly to the needs of the project and to plan various ON-premises as well as full-services implementations. The architecture takes into account a variety of protection mechanisms against a wide range of attack vectors, such as the man-in-the-middle attack. The entire solution is GDPR compliant and meets current industry cybersecurity requirements.