Our cyber hedgehog platform includes the process of data collection from a wide range of sensors by our EdgeCOM. This processes and forwards the information to the server in a data protection-compliant, secure and environmentally friendly manner. The data is stored on the server and can be visualized on our portal.

Data acquisition

Data analysis & transfer


Data visualization

Data acquisition








Datenanalyse &



Data visualization

Edge Computing

Local data processing is the future!

With edge computing, a computer collects and processes environmental, traffic and lighting data locally in the network, for example at luminaires. Local processing enables real-time applications to be implemented and only small amounts of data to be forwarded, taking data protection into account.

  • efficient
  • energy saving
  • low data volumes

Cyber Security






Highest security for your protection

Our Cyber Hedgehog platform is designed to provide maximum security. With a wide range of security features, we set the standard for protecting your sensitive data:

  • an extra secured area (Trustzone) directly on the EdgeCOM protects sensitive data from unauthorized access,
  • encryption/decryption prevents software and data from being tapped or manipulated,
  • only authorized and signed software will run on your EdgeCOM,
  • Secure Boot: each time the device is restarted, the device is checked for compromised software and only unmodified software is started and
  • a permanently integrated memory (eMMC memory) prevents easy removal and thus theft or replacement of the operating software.

One gateway for everything

The EdgeCOM is characterized by its multiple connection options, which allow a wide range of sensors and applications to be combined. These include:

  • PoE
  • RS485
  • USB
  • Ethernet 
  • LTE/5G, Wifi und Bluetooth
  • GPS

With this series of connections we offer you the flexibilityto seamlessly integrate a wide variety of devices and technologies. Due to the variety of connections, multiple sensors can be connected to one EdgeCOM. It thus combines many conventional gateways into one and contributes to sustainability .

Maximum Performance

The EdgeCOM enables data to be processed  locally  and results to be transmitted in a  resource-efficient manner. It also enables prioritization of  real-time applications and  machine learning. With our platform, powerful capabilities are available to take your applications to the next level.

Tabelle leistung

The next generation of gateways

Compared to conventional gateways, the EdgeCOM offers a number of key advantages that take our applications to a new level. With our advanced features, we set the standard for industry-standard performance, security and quality.

  • Higher Cyber Security
  • Greater capacity to act
  • Higher quality in industry standard
  • Fewer hardware components (gateways) required

With our EdgeCOM, you benefit from more cost-effective, resource-efficient, lower-maintenance and more stable solutions compared to conventional gateways. Our platform provides you with the necessary features to run your applications efficiently and securely. 

Feel free to contact us to learn more!


Data transfer securely from A to B


For the reliable transmission of data from the EdgeCOM to a defined server, we use M2M SIM cards in combination with an access-restricted SSH procedure (secure shell). SSH provides an encrypted connection between the EdgeCOM and the server, protecting your data from unauthorized access and ensuring the security of the transmitted information. In addition, SCF ensures the following general conditions as part of the cyber security concept:

  • firmly defined point-to-point communication
  • Up-to-date authentication & encryption method with one random & automatic key exchange per connection between device and server and between devices

Flexible server-architecture for any application

To ensure a high level of security for the stored data, SCF's cyber hedgehog concept prevents devices from accessing the database directly. Containers are interposed in each case to create another "security wall" and make access more difficult. 

The state-of-the-art, maintained container architecture makes it possible to react flexibly to the needs of the project and to plan various ON-premises as well as full-services implementations. The architecture takes into account a variety of protection mechanisms against a wide range of attack vectors, such as the man-in-the-middle attack. The entire solution is GDPR compliant and meets current industry cybersecurity requirements.


Habt ihr mich schon entdeckt?
Ich verstecke mich nicht nur im Namen Cyber-Hedgehog-Plattform sondern auch im ganzen Konzept von SCF. Meine Stacheln spiegeln die Sicherheitsfeatures unserer Edge Computing Plattform wieder. Denn an meinen Stacheln kommt keiner vorbei!


Büro Berlin
+49 (0)30 639 280 416 

Am Studio 2
12489 Berlin

Feel free to ask anything you want.