Your Energy. Your Data. Protected.

Cybersecurity & Information Security at TESVOLT

Modern battery storage systems are no longer just hardware — they are connected, controllable systems with a direct impact on energy flows, costs, and grid stability. Without a secure architecture, there is a risk of unauthorized third-party access, manipulation of charging and discharging processes, data leaks involving sensitive consumption, operational and trading data, as well as system failures caused by insecure integration.

At TESVOLT, we take information security seriously. We protect our data, systems, and technologies through a holistic approach designed to ensure confidentiality, integrity, and availability at all times. Our Information Security Management System (ISMS) is based on proven standards and continuous improvement — because only this enables us to provide the highest level of security for our partners, customers, and employees.

Our Principles of Information Security

  • Confidentiality: Protection of sensitive company and customer data against unauthorized access.
  • Integrity: Ensuring the accuracy and reliability of all information.
  • Availability: Guaranteeing that systems and data are accessible to authorized users at all times.
  • Business Continuity: Safeguarding business processes through preventive and reactive measures.
  • Employee Competence: Promoting strong security awareness and continuous training.
  • Access Controls: Clear regulations governing access to information and IT systems.
  • Compliance: Adherence to all legal, contractual, and internal requirements.
  • Risk Management: Proactive identification and mitigation of potential threats.
  • Culture of Learning: Continuous improvement through insights gained from security incidents.

Security Begins with the System Architecture

TESVOLT follows a security-by-design approach in which all components — from the battery system to the cloud — are connected through a central, controlled instance.

Key principles:

  • Centralized control via TESVOLT Energy Management System & TESVOLT IoT Gateway
    Reduces direct communication between external systems and components
  • Reduced attack surface
    Systems communicate through hardened interfaces
  • Clear data flows
    Transparency and control over data movement

Control Over Your Data

At TESVOLT, operators retain full control over their data and systems.

Mechanisms:

  • Role-based access management (RBAC)
  • Personalized user accounts (“named users”)
  • Traceable system changes (audit trails)
  • No direct third-party access to battery storage systems

Software Developed According to the Latest Security Standards

This technical architecture is part of our holistic ISMS and supports the secure control of our systems.

TESVOLT develops all core software components according to established best practices:

  • Security by Design
  • Automated testing & continuous integration
  • Code reviews & version control
  • Monitoring of security vulnerabilities (CVE)
  • Clear release and update processes

Operational Security & Updates

Cloud & Hosting (EU / Germany)

Long-term security throughout the entire lifecycle:

  • Regular security and functional updates
  • Updates available even beyond the warranty period
  • Remote maintenance via secure infrastructure
  • Monitoring & automatic notifications

Secure Infrastructure

  • Hosting within the EU
  • Collaboration with certified hosting partners (ISO 27001)
  • Strict data protection requirements (GDPR)

Organisation & Governance

Compliance & Future-Proof Security

Information Security as a Corporate Strategy

  • Implementation of an ISMS (Information Security Management System)
  • Preparation for ISO 27001 certification
  • Clear responsibilities & security governance
  • Regular security audits & task forces

Information security is an integral part of our corporate strategy and is firmly embedded in our business processes as well as our quality management system.

TESVOLT aligns with relevant standards and future regulatory requirements:

  • ISO 27001 (in preparation)
  • NIS2 Directive
  • Cyber Resilience Act (CRA)
  • Industry standards (e.g. IEC 62443)

TESVOLT relies on a strong ISMS program that not only ensures compliance, but also supports long-term business success. We continuously improve our security measures and view information security as a strategic business objective.

Interested in learning more details?

TESVOLT develops energy systems that are not only powerful and economically efficient, but also meet cybersecurity and data protection requirements.

As a TESVOLT partner, you receive centralized access to all product-related information, services, and offerings via the Partner Portal .

Contact us