SECURITY AND TRUST

Setting the standard in cybersecurity and trust for mobility data

At Rekor, security is more than just a priority—it’s the foundation of everything we do. As a leader in secure and intelligent roadway infrastructure, Rekor is redefining how transportation systems can be safeguarded from emerging threats.

Security lock overlaid a smart road with data points
CYBERSECURITY FRAMEWORK

Protecting hardware, software, and AI usage

Rekor Edge Pro camera attached to pole with solar panel in a sunny business district

Hardware

Ensuring edge devices and sensors remain protected and resilient to physical and digital threats.

Explore hardware security  
Rekor Command dashboard displayed on a computer monitor with a person sitting in front

Software

Cloud-based solutions fortified with advanced encryption and strict compliance frameworks.

Explore software security  
Hand pushing AI icon with other dashboards on screen

Artificial Intelligence

Artificial intelligence used responsibly to to advance and improve roadway intelligence technologies.

Explore AI security  
Rekor Edge Max camera system deployed in a field with cybersecurity pictures and an Edge Processing Unit on the side
HARDWARE SECURITY

Edge computing with hardware security at the frontlines

Our Edge computing devices, deployed across highways, cities, and critical infrastructure, are designed to withstand both cyber and physical threats.

  • Advanced Intrusion Detection: Edge systems include firewalls and anomaly detection to monitor for suspicious activity in real-time.
  • Access Control Mechanisms: We employ multi-layered identity verification and strict access protocols to ensure devices are protected from unauthorized access​.
  • Routine Penetration Testing: Every device undergoes rigorous third-party penetration testing to proactively address issues.
SOFTWARE SECURITY

Cloud security to fortify our software solutions

Our cloud-based infrastructure, hosted on AWS Cloud and GovCloud, ensures that Rekor’s applications and data are safeguarded through best-in-class software security measures.

  • Encryption at Every Level: Data is protected in transit and at rest using AES-256 encryption.
  • Compliance and Automated Auditing: Continuous monitoring through AWS tools like AWS Shield and Audit Manager ensures our systems remain secure and compliant​.
  • DDoS and Threat Protection: Rekor benefits from AWS’s built-in security, with automatic detection and mitigation of network-based attacks like DDoS.
Person looking at Rekor Command on computer screen with cloud security pictures related to AWS on the side
Car driving on a road with analytics and date overtop and other security images overlaid
ARTIFICIAL INTELLIGENCE SECURITY

Artificial Intelligence security for responsible innovation

Artificial intelligence is at the heart of Rekor’s technology, but it’s always deployed responsibly and ethically.

  • AI-Driven Threat Detection: Our AI models quickly identify and neutralize potential threats, from phishing to ransomware.
  • Human Oversight and Accountability: AI outputs are always subject to human review, ensuring that decision-making aligns with ethical standards and regulatory compliance​.
  • Privacy by Design: All personal data processed by AI systems is anonymized and protected, adhering to a zero-trust framework that limits access to only what is essential​.
COMPLIANCE STANDARDS

Leading the industry with excellence

At Rekor, compliance is not just about following the rules—it’s about setting new standards for cybersecurity excellence in transportation and mobility. Our commitment to industry-leading practices is demonstrated by our strict adherence to the following certifications, frameworks, and cryptographic protocols.

SOC 2 Certified Badge

SOC 2

Verifies that our software platforms meet rigorous standards for security, availability, processing integrity, confidentiality, and privacy. We undergo regular third-party audits to demonstrate our commitment to protecting customer data and delivering secure services.

NIST 800-53 Compliant Badge

NIST 800-53

Establishes a set of federal-level security and privacy controls for information systems, ensuring confidentiality, integrity, and availability. These controls offer a structured framework for identifying and mitigating risks across government and enterprise environments.

ISO 27001 Compliant Badge

ISO 27001

This standard focuses on information security management systems (ISMS), helping identify, assess, and mitigate risks to critical information. Compliance ensures that Rekor maintains a proactive stance on preventing data breaches and improving security practices​.

SHA-256 Certified Badge

SHA-256

Rekor uses the SHA-256 cryptographic hash function to anonymize license plate data collected by edge devices. This algorithm ensures data is irreversible, preventing the exposure of personally identifiable information. Stored data is encrypted and access-controlled.

CJIS Compliant Badge

CJIS Compliance

This standard governs the handling of criminal justice information, mandating strict access control, encryption, and audit procedures. Rekor's compliance ensures that our public safety solutions meet the highest standards required by law enforcement agencies.

ATC Standards Compliant Badge

ATC Standards

The Advanced Transportation Controller (ATC) standards guarantee that traffic management systems are fortified against cyber threats. This ensures the secure and reliable operation of critical transportation infrastructure like traffic signals and connected vehicles.

FREQUENTLY ASKED QUESTIONS

Understand our approach to security and compliance

We understand that trust is built on transparency. Below are answers to some of the most common questions about how Rekor ensures the security, privacy, and reliability of our systems, software, and AI solutions.