We have developed a comprehensive suite based on state-of-the-art technologies that brings strong security to IoT Systems:
• State-of-the-art secure elements on client side
• Standard cryptographic protocols for communication channels and data encryption
• Standard X.509-v3 certificates for mutual authentication
Building automation
Automotive
Health
Production lines
Smart cities
Utilities
Interest in IoT is rapidly growing in many of today’s business sectors.
IoT devices have countless applications that are designed to make life easier and simpler, but as the number of connected devices grows so do the attempts to compromise their security. As we connect more devices - an expected one trillion by 2035 - we need to design-in enough protection to secure them against emerging threats.
Theft of intellectual properties
Theft of Data
and PIL
Access from unauthorized devices
Spread of unauthorized firmware
We must ensure that our products are not putting an organization's assets and public and private infrastructure at risk.
Given that the new opportunities, knowledge and insights brought and enabled by the IoT are meant to benefit people and businesses, it's clear that the security of our connected devices and data streams cannot be just an afterthought.
Security must be embedded in every element and process, starting from the design phase.
Our IoT Secure Suite® offers security solutions tailored to the true needs of each use case, in order to extend the protection to as many as possible smart and connected devices.
With our IoT Secure Suite® we provide our customers with access to a unique security process capable of building a secure IoT infrastructure, taking into account all relevant system components (Client Protection, Data Protection, Cloud Protection, Channel Protection).
State-of-the-art PKI with X.509-v3 standard certificates
Secured procedure for Device certificates generation
CA’s Private keys securely stored
Safe and reliable set up of PKI
State-of-the art support for Smartphone and PCs connections
Each device is provisioned with a unique set of keys
• For secure communication
• For secure firmware upgrade
• Application-specific keys
The Key provisioning process is secured
Ability to secure data exchange between devices and cloud
Fine-grained device identification
Each device enables the use of a secure element
The SE safely stores secret and private data
The SE enables secure exchange with other system elements
Non cloneable device
IP protection
Secure mutual authentication with other parties of infrastructure
The firmware is encrypted and signed
The devices can determine if firmware is genuine
Firmware update accessible only for genuine devices
Only genuine firmware can be installed on devices
In recent years, various initiatives have been launched worldwide to highlight the main risks associated with the lack of security in the IoT sector and recently the UK government published the Code of Practice for IoT Security.
The aim of the Code of Practice is to support all parties involved in the development, manufacturing and retail of consumer IoT with a set of 13 guidelines to ensure that products are secure by design.
No default passwords
Implement a vulnerability disclosure policy
Keep software updated
Securely store credentials and security-sensitive data
Communicate securely
Minimise exposed attack surfaces
Ensure software integrity
Ensure that personal data is protected
Make systems resilient to outages
Monitor system telemetry data
Make it easy for consumers to delete personal data
Make installation and maintenance of devices easy
Validate input data
IoT Secure Suite® is perfectly compliant with all these requirements and covers all these risks.
In September 2020 our IoT Secure Suite® was recorded in the Register of European Union trade marks
Are you looking for more information or for professional consulting?
Fill in the following form to get in touch with us: