IT approved network security.

We made security a C.O.R.E part of the Pelican solution.

IT approved network security.

We made security a C.O.R.E part of the Pelican solution.

We focused on providing a solution that comfortably sits within your existing network environment.

| Enterprise level security built directly into the solution.

Outbound Only Connection.
128-bit (AES) Encryption Standards.
No backdoor or open architecture operating systems.
In country cloud servers with single-point private connections.
Privatized cloud servers isolating data storage and communication.
Autonomous wireless networking.
Complex passwords and two-factor authentication options.

We focused on providing a solution that comfortably sits within your existing network environment.

| Enterprise level security built directly into the solution.

Outbound Only Connection. 128-bit (AES) Encryption Standards
No backdoor or open architecture operating systems.
In country cloud servers with single-point private connections.
Privatized cloud servers isolating data storage and communication.
Autonomous wireless networking.
Complex passwords and two-factor authentication options.

| Tailored to exceed your network security needs.

C.O.R.E stands for:

CREATE

Enforce automated networking to eliminate human error.

ORGANIZE

Structure for reliable connections with zero vulnerability and minimal latency.

RESTRICT

Hard-coded preventative measures for a retained isolation architecture.

ENCRYPT

Shield and key protected communications from data-point to data-point.

| Tailored to exceed your network security needs.

C.O.R.E stands for:

CREATE

Enforce automated networking to eliminate human error.

ORGANIZE

Structure for reliable connections with zero vulnerability and minimal latency.

RESTRICT

Hard-coded preventative measures for a retained isolation architecture.

ENCRYPT

Shield and key protected communications from data-point to data-point.

| Create an isolated and secure structured network.​

| Create an isolated and secure structured network.

CREATE: Automated Networking

We made installing Pelican simple. Your private Pelican cloud server (your Pelican Connect™ app) and the on-site Pelican wireless mesh network are both established automatically using our secure networked and wireless architecture. This allows for end-to-end reliable and fast connections.

CREATE: Address Management

Each device is auto-assigned an address on the Pelican network. This reduces misconfiguration and errors in the network communication architecture. It also enforces only Pelican-built device's ability to establish network links.

CREATE: Optimized Wireless Networking

As Pelican devices are installed at your facility, they auto-connect to the private Pelican wireless mesh network (no connection to WiFi required). This allows Pelican devices to go through a factory hard-coded security identification and approval process, while removing the need for devices to connect to your private business network.

CREATE: Pelican App & MySites

Once Pelican is installed at your property, your Pelican Connect™ app is automatically created on a private virtual cloud server. This isolates your data from other Pelican customers (they also have their own private virtual cloud server). Access into your app is managed through email and password identification with the ability to enforce two-factor authentication and/or complex password requirements.

When it comes to network creation, the Pelican solution is completely automated. This eliminates the potential for human error when addresses, encryption keys, and network paths are created.

CREATE: Automated Networking

We made installing Pelican simple. Your private Pelican cloud server (your Pelican Connect™ app) and the on-site Pelican wireless mesh network are both established automatically using our secure networked and wireless architecture. This allows for end-to-end reliable and fast connections.

CREATE: Address Management

Each device is auto-assigned an address on the Pelican network. This reduces misconfiguration and errors in the network communication architecture. It also enforces only Pelican-built device's ability to establish network links.

CREATE: Optimized Wireless Networking

As Pelican devices are installed at your facility, they auto-connect to the private Pelican wireless mesh network (no connection to WiFi required). This allows Pelican devices to go through a factory hard-coded security identification and approval process, while removing the need for devices to connect to your private business network.

CREATE: Pelican App & MySites

Once Pelican is installed at your property, your Pelican Connect™ app is automatically created on a private virtual cloud server. This isolates your data from other Pelican customers (they also have their own private virtual cloud server). Access into your app is managed through email and password identification with the ability to enforce two-factor authentication and/or complex password requirements.

| Create an isolated and secure structured network.

When it comes to network creation, the Pelican solution is completely automated. This eliminates the potential for human error when addresses, encryption keys, and network paths are created.

When it comes to network creation, the Pelican solution is completely automated. This eliminates the potential for human error when addresses, encryption keys, and network paths are created.

We made installing Pelican simple. Your private Pelican cloud server (your Pelican Connect™ app) and the on-site Pelican wireless mesh network are both established automatically using our secure networked and wireless architecture. This allows for end-to-end reliable and fast connections.

Each device is auto-assigned an address on the Pelican network. This reduces misconfiguration and errors in the network communication architecture. It also enforces only Pelican-built device’s ability to establish network links.

As Pelican devices are installed at your facility, they auto-connect to the private Pelican wireless mesh network (no connection to WiFi required). This allows Pelican devices to go through a factory hard-coded security identification and approval process, while removing the need for devices to connect to your private business network.

Once Pelican is installed at your property, your Pelican Connect™ app is automatically created on a private virtual cloud server. This isolates your data from other Pelican customers (they also have their own private virtual cloud server). Access into your app is managed through email and password identification with the ability to enforce two-factor authentication and/or complex password requirements.

| Organize the network for low latency and retained security.

A properly organized solution (from your Pelican private cloud server to your private Pelican Connect™ app to each installed Pelican device) helps guarantee no weak points across the solution. Data center locations, cloud server creation, network addresses, wireless paths, and all other data communications are automated. This insures both heightened security and fast network speeds.

| Organize the network for low latency and retained security.

A properly organized solution (from your Pelican private cloud server to your private Pelican Connect™ app to each installed Pelican device) helps guarantee no weak points across the solution. Data center locations, cloud server creation, network addresses, wireless paths, and all other data communications are automated. This insures both heightened security and fast network speeds.

| Restrict all communication to only Pelican authenticated devices.

RESTRICT: Pelican App Access

Access into your Pelican Connect™ app is managed through authenticated email and password requirements.

To enhance access security control, Pelican also provides complex password and two-factory authentication login options.

RESTRICT: Data Storage

No two Pelican customer's data sits on the same virtual server.

This enforces the isolation architecture for all network connections and data storage.

RESTRICT: Gateway Connection

A Pelican Gateway is just a bridge between the on-site Pelican Wireless Network and the connection to your Private Virtual Server.

It is not a server and it does not run any form of open-source operating system.

The Gateway establishes an out-bound connection to your private cloud server. Data remains secure from the server to the end-device.

RESTRICT: Wireless Isolation

Pelican's uses the 802.15.4 wireless standard. This network standard is designed to co-exist with 802.11 (WiFi) and other 802.15.4 devices, without any interconnectivity or interference. Taking it one step further, Pelican communicates on a channel in the 802.15.4 wireless standard that WiFi is not even allowed to be in.

This keeps Pelican 100% isolated from your private business network.

An isolated architecture is the most secure. The Pelican solution has built-in restrictions to keep its network isolated from other public and private networks.

| Restrict all communication to only Pelican authenticated devices.

Access into your Pelican Connect™ app is managed through authenticated email and password requirements.

To enhance access security control, Pelican also provides complex password and two-factory authentication login options.

No two Pelican customer’s data sits on the same virtual server.

This enforces the isolation architecture for all network connections and data storage.

A Pelican Gateway is just a bridge between the on-site Pelican Wireless Network and the connection to your Private Virtual Server.

It is not a server and it does not run any form of open-source operating system.

The Gateway establishes an out-bound connection to your private cloud server. Data remains protected from the server to the end-device.

Pelican’s uses the 802.15.4 wireless standard. This network standard is designed to co-exist with 802.11 (WiFi) and other 802.15.4 devices, without any interconnectivity or interference. Taking it one step further, Pelican communicates on a channel in the 802.15.4 wireless standard that WiFi is not even allowed to be in.

This keeps Pelican 100% isolated from your private business network.

Printable PFD Wireless Spectrum Document

| Encrypted end-to-end data transfer.

Authorized network communication only.

FACTORY ENCODED

All Pelican hardware is manufactured, software programmed, and tested in our manufacturing facilities in California. Only devices we manufacturer can communicate with the Pelican network.

128-BIT (AES) ENCRYPTION

All data is secured using Advanced Encryption Standard (AES) 128-bit encryption. Data is protected from each Pelican device installed at your facility all the way to your private cloud server.

ENFORCED KEY ROTATION

Unique security keys are used to provide strong network verification and secure communication paths between your Pelican devices and your cloud server. Automated key rotations occur to keep data protected. Key rotations can also occur upon request.

VPN CONNECTIONS

Your Pelican Gateway establishes a single TCP/IP Virtual Private Network (VPN) connecting with your private cloud server across a secure connection. This protects the privacy and integrity of data and prevents man-in-the-middle attacks.​​

| Encrypted end-to-end data transfer.

Authorized network communication only.

FACTORY ENCODED

All Pelican hardware is manufactured, software programmed, and tested in our manufacturing facilities in California. Only devices we manufacturer can communicate with the Pelican network.

128-BIT (AES) ENCRYPTION

All data is encrypted using Advanced Encryption Standard (AES) 128-bit encryption. Data is protected from each Pelican device installed at your facility all the way to your private cloud server.

ENFORCED KEY ROTATION

Unique security keys are used to provide strong network verification and secure communication paths between your Pelican devices and your cloud server. Automated key rotations occur to keep data protected. Key rotations can also occur upon request.

VPN CONNECTIONS

Your Pelican Gateway establishes a single TCP/IP Virtual Private Network (VPN) connecting with your private cloud server across a secure connection. This protects the privacy and integrity of data and prevents man-in-the-middle attacks.​​

| Outbound Port Only.

The Pelican solution establishes a single outbound only, secure connection, to your private Pelican cloud server. No Inbound firewall rules required.

Diagnostic and Troubleshooting.

UDP PORT

514

Establish/Verify Gateway's Primary Data Connection.

TCP PORT

9742

The Gateway is assigned a single outbound port in this range to connect to its private cloud server. This is dynamically assigned during installation and remains fixed to a specific IP address and port to allow IT departments to maintain best practices for firewall management.

TCP PORT

9800-11000

| Outbound Port Only.

The Pelican solution establishes an outbound only, secure connection, to your private Pelican cloud server. No Inbound firewall rules required.

UDP PORT 514

Diagnostic and Troubleshooting.

TCP PORT 9742

Establish/Verify Gateway's Primary Data Connection.

TCP PORT
9800 -11000

The Gateway is assigned a single outbound port in this range to connect to its private cloud server. This is dynamically assigned during installation and remains fixed to a specific IP address and port to allow IT departments to maintain best practices for firewall management.

| Outbound Port Only.

The Pelican solution establishes an outbound only, secure connection, to your private Pelican cloud server. No Inbound firewall rules required.

UDP PORT 514

Diagnostic and Troubleshooting.

TCP PORT 9742

Establish/Verify Gateway's Primary Data Connection.

TCP PORT
9800 -11000

The Gateway is assigned a single outbound port in this range to connect to its private cloud server. This is dynamically assigned during installation and remains fixed to a specific IP address and port to allow IT departments to maintain best practices for firewall management.

Our Mission

Strip away complexity and create climate management simplicity. We exist to make indoor comfort obtainable no matter your commercial footprint. 

Why? Because maintaining comfort should not be complex or expensive. And we believe you deserve to be in control.

Get In Touch

Our Mission

Strip away complexity and create climate management simplicity. We exist to make indoor comfort obtainable no matter your commercial footprint. 

Why? Because maintaining comfort should not be complex or expensive. And we believe you deserve to be in control.

Get In Touch

Our Mission

Strip away complexity and create climate management simplicity. We exist to make indoor comfort obtainable no matter your commercial footprint. 

Why? Because maintaining comfort should not be complex or expensive. And we believe you deserve to be in control.

Get In Touch

Data center locations

Atlanta, Georgia, USA

Dallas, Texas, USA

Fremont, California, USA

Newark, California, USA

Toronto, Ontario, Canada

cloud server certifications

Pelican only hosts customer sites at data centers that meet or exceed SOC I and SOC II security requirements. All locations are certified by third party organizations to meet these requirements. These data centers are similar to Amazon Web Services (AWS).

What does this mean?

All data centers are maintained at the highest modern standards, including 24/7 on-site security, access control, and high availability.

what are FIRWALL RULES?

The configuration of your firewall is important for managing network security, while allowing your business to establish network connections needed for seamless Internet connectivity. Customizing firewall rules enables specific ports, services and IP addresses to connect from inside or outside of your private network. While both are used in many network architectures, there are different reasons for when one is used over the other.

Both outbound and inbound connections provide two-way communication between devices. The important piece is how the device securely connects from either inside or outside of your private network.

what is an outbound connection?

An outbound connection is a connection that is established from inside your business out to the Internet. This is the same type of connection your computer is currently making to access this website from your browner. In most cases, there are no firewall restrictions to outbound connections because they pose minimal security risk.

Some IT Departments filter outbound traffic to help monitor network behavior. In these situations, Pelican uses specific Outbound ports: UDP 514, TCP 9741, and a defined port on the TCP 9800-11000 range, so that your Pelican solution is retained within your IT Team’s standard outbound port security process.

what is an inbound connection?

An inbound connection is a connection that is established from outside of your business, from the Internet, into your private network. Inbound firewall rules are very restrictive because they need to be managed and regulated to protect internal network systems from outside threats. You might know this type of connection as a VPN or virtual private network, where your IT Department has established specific process and steps to allow a personal computer or laptop to connect into part or the entirety of your private internal network.

Although Inbound connections can be created in an extremely secure way, they always pose high security risks, require complex regulations, and are generally not allowed by many IT Departments. Pelican does not require ANY inbound firewall allowances for their solution to operate, which assists in eliminating these security risks and complex security practices.