SlideShare a Scribd company logo
1 of 4
Download to read offline
Technology allows people, objects and machines to connect to one
another, creating new opportunities to improve people’s lifes:
> Optimize processes and resources;
 Reduce risks;
 Improve end-user experience and
 Create or increase business.
IoT success can only happen if data can be trusted
WISeKey provides an end-to-end
scalable security framework to
be integrated into IoT platforms.
Based on PKI Technology, it will
protect the device and its data at
rest or in transit.
WISeKey delivers cryptographic
root keys and solutions to use and
manage digital certificates and
associated secure assets that protect
otherwise vulnerable IoT devices
in the field.
Securing
the Internet
of Things
wisekey.com
info@wisekey.com
VaultIC is a product family, ranging from
tamper-resistant Integrated Circuits to software
vaults, to be used as a companion to the
IoT-device host processor. VaultIC chips fea-
ture a configurable cryptographic tool box
for authentication, confidentiality and inte-
grity, executed in a secure environment.
VaultIC embeds on-chip non-volatile tamper
resistant data storage capabilities for keys,
certificates and customer data.
The VaultIC chips’ low-power consumption
profile make them a viable solution to meet
the limited power budgets of IoT devices.
VaultIC comes with middleware enabling
secure boot, secure firmware update for IoT
devices secure communication (SSL/TLS).
IoT:
Internet of Threats?
Distributed Denial of Services (DDoS)
attacks are becoming increasingly ubiqu-
tous and dangerous, causing organizations
billion dollar losses; Man in the middle
attacks on video surveillance cameras are
almost common ground. These are just two
examples of threats faced by IoT systems.
Hackers have different motivations (fun,
money, terrorism…) and resources (mate-
rial, collusion, expertise) to penetrate a sys-
tem, but all IoT Systems will face hacking.
Consequences can be heavy: disrupted
services, intrusion on users’ privacy and
safety, theft of intellectual property,
damaged brand reputation, loss of revenue,
job destruction and more. WISeKey offers
proven products and solutions to reduce
the risk of IoT attacks.
Intercept data
Take control
of the router /
server
Take control
of the application
Take control
of the device
Intercept data
Penetrate the
network through
low security devices
Sensors /
Smart objects
Sensors /
Smart objects
Gateways /
Routers
Servers
WPAN/WLAN/Ethernet
Broadcast
fake content
Insert
non-authorized
device
A Root of Trust (RoT) is the basis for a
global end-to-end security solution. A RoT
serves as a common trust anchor, which is
recognized by the operating system (OS)
and applications, to ensure the authenti-
city, confidentiality and integrity of on-line
transactions. With the certificates signed
by this cryptographic RoT, embedded in
the device, the IoT product manufacturers
can use PKI (Public Key Infrastructure)
technologies to secure interaction among
objects and between objects and people.
WISeKey is the trusted operator of the
International Organization for the Security
of Electronic Transaction (OISTE) Global
Root, which is widely distributed in com-
monly used software.
The OISTE Foundation is working with
the United Nations and International
Organizations. Swiss neutrality, security,
and privacy laws allow operations without
geo-political or governmental constraints.
It Root of Trust is set in a military grade
bunker located in the Swiss Alps.
WISeKey’s Unique Root of Trust Model
https://www.wisekey.com/products/vaultic/
secure-solutions
Illustrating some potential attacks
Secure Element: VaultIC
Use of Digital
Certificates
Digital certificates and associated cryp-
tographic assets are used to identify and
authenticate devices during their entire
life. Only trusted devices can connect to
secure networks. Digital certificates, for
instance SSL certificates, can also be used
to secure communication channels from
devices to gateways/routers, and from
gateways/routers to servers.
WISeKey also offers solutions to control
the device’s firmware integrity at initial
stage (bootloader) and during upgrades in
the field.
framework
The Certificate Management System (CMS) is a software tool with a user-friendly interface and
easy-to-integrate API that manages the life-cycle of devices and their digital certificates.
These certificates are signed by WISeKey’s Certificate Authority and optionally the OISTE Root of Trust.
The optional security broker performs the authentication and validation of the messages coming from the diffe-
rent IoT devices and transfers only trusted messages to the IoT platform of our customer. The
framework can easily be integrated into an IoT platform by our customers and no additional security mechanisms
need to be implemented.
The framework also includes secure provisioning solutions to help maintain consistent high system
security, even when the IoT device is in an unsecured environment (e.g. during production or in the field). Device
configuration and firmware upgrades are made easy and secure at all times.
CMS can be installed on customer premises, or outsourced to WISeKey and located in one of our
secure data centers in Switzerland, USA, India or China.
The managed platform can be accesses through a browser and a web-service API. The CMS and the framework
are compatible with third party Certificate Authorities (CA), such as the Microsoft PKI or the Enterprise Java
Beans Certificate Authority (EJCBA) open source CA.
WISeKey
Certificate
status log
Data
management
Data
analytics
Applications
Management
Applications
Security Broker
Certificate
Attribute
Certificate
Management system
Certificate and
Certificate Owner
IoT Platform
WISeKey or 3rd
Party
IoT Database
IoT
device
Certificate
status log
CA
CA
Root Key
Root Key
Certification
Authorities
Certification
Authorities
Certification
Authorities
or 3nd
Party
PKI based security, Swiss Root of Trust
Software solution; optional
use of tamper resistant chip
Easy integration in IoT
platform, and in devices
Cost effective solution
Security for device in operation
and for provisioning
Certified security
WISeKey solid trusted partner
https://www.wisekey.com/
solutions/secured-iot/
wisekey.com
info@wisekey.com

More Related Content

What's hot

KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
Martin Ruubel
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
Tonex
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
Martin Ruubel
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
Harriet Schneider
 

What's hot (20)

Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Augmate connect summary
Augmate connect summaryAugmate connect summary
Augmate connect summary
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
 

Similar to WISekey IoT Technologies Presentation

Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_Industry
Johan Dentant
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 

Similar to WISekey IoT Technologies Presentation (20)

An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Bevywise - IoT / IIoT Portfolio
Bevywise - IoT / IIoT  PortfolioBevywise - IoT / IIoT  Portfolio
Bevywise - IoT / IIoT Portfolio
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Brief
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_Industry
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
IOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkIOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT Framework
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 

More from Creus Moreira Carlos

Billionaire hinduja hits lima for more business, less ego bloomberg business
Billionaire hinduja hits lima for more business, less ego   bloomberg businessBillionaire hinduja hits lima for more business, less ego   bloomberg business
Billionaire hinduja hits lima for more business, less ego bloomberg business
Creus Moreira Carlos
 
Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013
Creus Moreira Carlos
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
Creus Moreira Carlos
 

More from Creus Moreira Carlos (20)

Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche
 
Interview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin DimancheInterview Carlos Moreira Le Matin Dimanche
Interview Carlos Moreira Le Matin Dimanche
 
Security aspects on blockchain white paper
Security aspects on blockchain  white paperSecurity aspects on blockchain  white paper
Security aspects on blockchain white paper
 
wisekey history
wisekey historywisekey history
wisekey history
 
WISekey presentation
WISekey presentation WISekey presentation
WISekey presentation
 
Ft ifa football a4 brochure
Ft ifa football a4 brochureFt ifa football a4 brochure
Ft ifa football a4 brochure
 
Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02Vedomostiprl17011021 110921095139-phpapp02
Vedomostiprl17011021 110921095139-phpapp02
 
Billionaire hinduja hits lima for more business, less ego bloomberg business
Billionaire hinduja hits lima for more business, less ego   bloomberg businessBillionaire hinduja hits lima for more business, less ego   bloomberg business
Billionaire hinduja hits lima for more business, less ego bloomberg business
 
3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies3 Swiss companies listed among the World Economic Forum Global Growth Companies
3 Swiss companies listed among the World Economic Forum Global Growth Companies
 
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
WISekey nominated one of the 2014 Global Growth Companies Partners by the Wor...
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Presentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos MoreiraPresentation BigTrust at Malaga Valley by Carlos Moreira
Presentation BigTrust at Malaga Valley by Carlos Moreira
 
OISTE.ORG granted by the UN Special consultative status
OISTE.ORG  granted by the UN Special consultative status OISTE.ORG  granted by the UN Special consultative status
OISTE.ORG granted by the UN Special consultative status
 
Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013Copie article tribune_de_genève_11_fév2013
Copie article tribune_de_genève_11_fév2013
 
Wi se key - wisephoneplus (esp)
Wi se key - wisephoneplus (esp)Wi se key - wisephoneplus (esp)
Wi se key - wisephoneplus (esp)
 
Bilan fev 2012 300dpi
Bilan fev 2012 300dpiBilan fev 2012 300dpi
Bilan fev 2012 300dpi
 
Fcb 4
Fcb 4Fcb 4
Fcb 4
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
Cleantech switzerland 2010-1
Cleantech switzerland 2010-1Cleantech switzerland 2010-1
Cleantech switzerland 2010-1
 

Recently uploaded

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 

Recently uploaded (20)

20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 

WISekey IoT Technologies Presentation

  • 1. Technology allows people, objects and machines to connect to one another, creating new opportunities to improve people’s lifes: > Optimize processes and resources; Reduce risks; Improve end-user experience and Create or increase business. IoT success can only happen if data can be trusted WISeKey provides an end-to-end scalable security framework to be integrated into IoT platforms. Based on PKI Technology, it will protect the device and its data at rest or in transit. WISeKey delivers cryptographic root keys and solutions to use and manage digital certificates and associated secure assets that protect otherwise vulnerable IoT devices in the field. Securing the Internet of Things wisekey.com info@wisekey.com
  • 2. VaultIC is a product family, ranging from tamper-resistant Integrated Circuits to software vaults, to be used as a companion to the IoT-device host processor. VaultIC chips fea- ture a configurable cryptographic tool box for authentication, confidentiality and inte- grity, executed in a secure environment. VaultIC embeds on-chip non-volatile tamper resistant data storage capabilities for keys, certificates and customer data. The VaultIC chips’ low-power consumption profile make them a viable solution to meet the limited power budgets of IoT devices. VaultIC comes with middleware enabling secure boot, secure firmware update for IoT devices secure communication (SSL/TLS). IoT: Internet of Threats? Distributed Denial of Services (DDoS) attacks are becoming increasingly ubiqu- tous and dangerous, causing organizations billion dollar losses; Man in the middle attacks on video surveillance cameras are almost common ground. These are just two examples of threats faced by IoT systems. Hackers have different motivations (fun, money, terrorism…) and resources (mate- rial, collusion, expertise) to penetrate a sys- tem, but all IoT Systems will face hacking. Consequences can be heavy: disrupted services, intrusion on users’ privacy and safety, theft of intellectual property, damaged brand reputation, loss of revenue, job destruction and more. WISeKey offers proven products and solutions to reduce the risk of IoT attacks. Intercept data Take control of the router / server Take control of the application Take control of the device Intercept data Penetrate the network through low security devices Sensors / Smart objects Sensors / Smart objects Gateways / Routers Servers WPAN/WLAN/Ethernet Broadcast fake content Insert non-authorized device A Root of Trust (RoT) is the basis for a global end-to-end security solution. A RoT serves as a common trust anchor, which is recognized by the operating system (OS) and applications, to ensure the authenti- city, confidentiality and integrity of on-line transactions. With the certificates signed by this cryptographic RoT, embedded in the device, the IoT product manufacturers can use PKI (Public Key Infrastructure) technologies to secure interaction among objects and between objects and people. WISeKey is the trusted operator of the International Organization for the Security of Electronic Transaction (OISTE) Global Root, which is widely distributed in com- monly used software. The OISTE Foundation is working with the United Nations and International Organizations. Swiss neutrality, security, and privacy laws allow operations without geo-political or governmental constraints. It Root of Trust is set in a military grade bunker located in the Swiss Alps. WISeKey’s Unique Root of Trust Model https://www.wisekey.com/products/vaultic/ secure-solutions Illustrating some potential attacks Secure Element: VaultIC
  • 3. Use of Digital Certificates Digital certificates and associated cryp- tographic assets are used to identify and authenticate devices during their entire life. Only trusted devices can connect to secure networks. Digital certificates, for instance SSL certificates, can also be used to secure communication channels from devices to gateways/routers, and from gateways/routers to servers. WISeKey also offers solutions to control the device’s firmware integrity at initial stage (bootloader) and during upgrades in the field. framework The Certificate Management System (CMS) is a software tool with a user-friendly interface and easy-to-integrate API that manages the life-cycle of devices and their digital certificates. These certificates are signed by WISeKey’s Certificate Authority and optionally the OISTE Root of Trust. The optional security broker performs the authentication and validation of the messages coming from the diffe- rent IoT devices and transfers only trusted messages to the IoT platform of our customer. The framework can easily be integrated into an IoT platform by our customers and no additional security mechanisms need to be implemented. The framework also includes secure provisioning solutions to help maintain consistent high system security, even when the IoT device is in an unsecured environment (e.g. during production or in the field). Device configuration and firmware upgrades are made easy and secure at all times. CMS can be installed on customer premises, or outsourced to WISeKey and located in one of our secure data centers in Switzerland, USA, India or China. The managed platform can be accesses through a browser and a web-service API. The CMS and the framework are compatible with third party Certificate Authorities (CA), such as the Microsoft PKI or the Enterprise Java Beans Certificate Authority (EJCBA) open source CA. WISeKey Certificate status log Data management Data analytics Applications Management Applications Security Broker Certificate Attribute Certificate Management system Certificate and Certificate Owner IoT Platform WISeKey or 3rd Party IoT Database IoT device Certificate status log CA CA Root Key Root Key Certification Authorities Certification Authorities Certification Authorities or 3nd Party
  • 4. PKI based security, Swiss Root of Trust Software solution; optional use of tamper resistant chip Easy integration in IoT platform, and in devices Cost effective solution Security for device in operation and for provisioning Certified security WISeKey solid trusted partner https://www.wisekey.com/ solutions/secured-iot/ wisekey.com info@wisekey.com