C2M® ensures that data is transferred and stored in a secure manner using the latest encryption methods. We do not allow unencrypted data to be transported to the platform, nor do we allow foreign devices to communicate to that platform. Furthermore all APIs have secret identification keys paired with SSL encryption.
C2M® architecture is structured so that the entire platform is efficiently distributed over multiple nodes. This allows the platform to connect and interact with any size data portfolio. From one device sending data once a week, to millions of devices sending data once a second, C2M® can deploy in an effective and scalable manner.