Secure IoT Device Credentialing

As the IoT becomes an integral part of business operations and consumer lives, developers must incorporate strong connected device security from the outset.

IoT/Device Credentialing

The IoT has already opened up new opportunities for businesses and consumers, and developers have only scratched the surface of what's possible. At the same time, a quick scan of the headlines reveals the security concerns that come with connected devices that can be remotely attacked and used for nefarious purposes. Thales e-Security is here to help. Thales e-Security works with IoT device manufacturers to incorporate strong authentication into connected devices to ensure that they can be trusted.

Remote Attacks

Once a device comes online it can become a target for cybercriminals who wish to conduct such attacks as using the device's trusted status to find an entry point to network systems or introducing code for other malicious purposes.

Issuing Bug Fixes and Other Updates

No manufacturer intends to deploy products with software bugs, but it does happen. Likewise, producers may wish to add new features and functionality to devices that have already gone out the door, potentially opening up additional revenue streams. While customers recognize that code updates may be required on occasion, producers must do so with minimal downtime to ensure a positive customer experience and protect revenues.

Unauthorized Production

Unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.

Device Authentication

IoT experts across the industry agree: Strong device authentication is required to ensure that connected devices can be trusted. Thales e-Security helps manufacturers create a unique device identity that can be authenticated when a device attempts to connect to a gateway or central server. With this unique ID in place, you can track each device throughout its lifecycle, communicate securely with it and prevent it from executing harmful processes. If a device exhibits unexpected behavior, you can simply revoke its privileges.

Code Signing

To ensure the integrity of software and firmware updates, and defend against the risks associated with code tampering or code that deviates from organizational policies, the code must be signed using a strong methodology. Thales e-Security has extensive expertise with code signing best practices, including securing signing keys using tamper-resistant hardware security modules.

Secure Manufacturing

Using Thales nShield HSMs and supporting security software, manufacturers can control the number of units built and the code incorporated into each.

Defense Against Attacks

By establishing trust in your connected devices, you can help ensure only authorized activity on your enterprise networks, providing better defense against attacks on data stores and corporate IP.

Cost Savings and Revenue Opportunities

With the ability to update devices deployed in the field, you can reduce the time and costs associated with in-person updates. You can also deliver firmware updates that create new revenue opportunities through improved product performance or additional functionality.

Protect Against Brand and Financial Damage

By defending against the production of unauthorized units you can mitigate the brand and financial damage associated with overbuilding and cloning, especially with remote manufacturing facilities.

Case Studies : Polycom

Best known for its iconic triangular-shaped conference phones, Polycom transformed business communication in the early 1990s, making it easier, more efficient, and more pleasant to collaborate with colleagues and partners around the globe. The company’s brand continues to be synonymous with quality, clarity, and convenience among IT buyers. With the market for Voice over Internet Protocol (VoIP) devices growing and a portfolio of VoIP phones spanning from the desktop to the conference room, Polycom decided to enhance its phones by giving them a unique identity, making it easier to identify them on customer and service providers’ networks while thwarting would-be counterfeiters and fraudsters. How? With digital certificates and encryption keys generated and secured by Thales hardware security modules (HSMs) from the nCipher product line.

Download

Data Sheets : Thales nShield

The nCSE provides the training to give your people the knowledge to get the most from your investment. Getting the best from your technology requires a technology, getting the best use from it depends on how much you invest in it. Thales has an enviable reputation in the field of data protection, with over 40 year’s experience. ASG are the professional services department within Thales e-security division. With a dedicated team of 14 consultants ASG are well placed to offer expert advice and training on all Thales hardware security devices, giving you the confidence to deploy efficiently and effectively

Download

Case Studies : Qube Cinema

As a manufacturer of servers, projectors, mastering and distribution technology for digital cinema, Qube Cinema saw a unique opportunity to introduce a highly disruptive technology to the market as the film industry was completing a decade-long transition from physical to digital distribution. Digital offered tremendous benefits – it was much less expensive to produce and send hard drives than multiple reels of film prints. Digital films could be distributed much more quickly, enabling distributors to better meet demand. Digital films wouldn’t degrade over time, and they could be projected by less-skilled labor.

Download
인터랙티브 동영상 시청하기 자세히 보기
라이브 데모 예약하기 예약하기
전문가와 상담하기 연락하기