[ coming soon ]


No cutting corners with IoT security

The edge security solution for IoT devices that ensures flexibility, ease of use and zero exposure using PKI and TLS level isolation. Find out how!

request a demo

Everything ID

Everything ID

We find it normal to authenticate into the dashboard of a thermostat, after all, it is important that we tell the device who we are, when we make a configuration change or look at the data. But this is not the future, this is the past. There are currently 4.5 billion active users on the Internet and about 23.5 billion Internet native entities. The future is things connecting to things, much more than humans connecting to things. For that to be possible every thing must have an ID.

The Identity plus digital identity platform makes no differentiation between autonomous things and user handled devices to allow seamless communication between any two things on the Internet - present or future.

Escape From Default Passwords

Escape From Default Passwords

First time access is the biggest conundrum for IoT. Manufacturers must make sure that the device has a default accessibility option (new users / factory reset), for obvious reasons. This almost always means default, built-in, universal passwords, which users often leave unchanged, making such devices trivial to hijack. The rest is history repeating itself all-too-often.

Secure Ownership
Lifecycle

The PKI authentication mechanism behind identity plus, makes it possible to deploy IoT devices with cryptographically bound owners. This means, the device need not spend a single second on the Internet in an insecure state.

Unified
User Experience

Access to IoT devices is performed via identity plus. Users will get the same, seamless user experience they have with any their SaaS application, powered my Mutually Authenticated TLS.

Zero Day Barrier

Zero Day Barrier

The second biggest problem for IoT device is their inherent remote nature which makes patching difficult or impossible. Thanks to that, an IoT device will run with out-dated software almost from the day it is placed on the network. It is only a matter of time until unpatched vulnerabilities get exploited.

TLS isolation model blocks connections from unknown devices. You can have all the vulnerabilities in the world on your device, they become impossible to exploit, because it is impossible to establish a connection. Imagine it like having an exclusive physical line to your IoT device anywhere you go.

Security @ the Edge

Security @ the Edge

The current trend for securing IoT devices is to hide them behind a cloud. While this may be effective from a security perspective in certain situations, the option is technologically limiting, creates platform dependencies, vendor lock-in, traffic latency, fosters centralization and destroys privacy (you are actually sharing the data with the cloud provider).

IoT devices live on the edge as independent units. They were never meant to be locked up in a local network or the cloud. The identity plus TLS level isolation model, allows IoT devices to be both secure and independent.

Request A Demo

The Internet of Things brings about a giant transformation, but in order to fulfill its true potential the Internet of Things itself needs to go through an identity revolution. One that provides strong authentication, attribution, the necessary level of isolation and accounts for the distribute and diverse nature of the future Internet. Find out how PKI and the TLS stack can help with that!

request a demo