Everything ID |
Everything IDWe find it normal to authenticate into the dashboard of a thermostat, after all, it is important that we tell the device who we are, when we make a configuration change or look at the data. But this is not the future, this is the past. There are currently 4.5 billion active users on the Internet and about 23.5 billion Internet native entities. The future is things connecting to things, much more than humans connecting to things. For that to be possible every thing must have an ID. The Identity plus digital identity platform makes no differentiation between autonomous things and user handled devices to allow seamless communication between any two things on the Internet - present or future. |
Escape From Default Passwords |
Escape From Default PasswordsFirst time access is the biggest conundrum for IoT. Manufacturers must make sure that the device has a default accessibility option (new users / factory reset), for obvious reasons. This almost always means default, built-in, universal passwords, which users often leave unchanged, making such devices trivial to hijack. The rest is history repeating itself all-too-often.
|
Zero Day Barrier |
Zero Day BarrierThe second biggest problem for IoT device is their inherent remote nature which makes patching difficult or impossible. Thanks to that, an IoT device will run with out-dated software almost from the day it is placed on the network. It is only a matter of time until unpatched vulnerabilities get exploited. TLS isolation model blocks connections from unknown devices. You can have all the vulnerabilities in the world on your device, they become impossible to exploit, because it is impossible to establish a connection. Imagine it like having an exclusive physical line to your IoT device anywhere you go. |
Security @ the Edge |
Security @ the EdgeThe current trend for securing IoT devices is to hide them behind a cloud. While this may be effective from a security perspective in certain situations, the option is technologically limiting, creates platform dependencies, vendor lock-in, traffic latency, fosters centralization and destroys privacy (you are actually sharing the data with the cloud provider). IoT devices live on the edge as independent units. They were never meant to be locked up in a local network or the cloud. The identity plus TLS level isolation model, allows IoT devices to be both secure and independent. |
Request A DemoThe Internet of Things brings about a giant transformation, but in order to fulfill its true potential the Internet of Things itself needs to go through an identity revolution. One that provides strong authentication, attribution, the necessary level of isolation and accounts for the distribute and diverse nature of the future Internet. Find out how PKI and the TLS stack can help with that! |