Hi [[ session.user.profile.firstName ]]

Device Authority - IoT Security

  • Date
  • Rating
  • Views
  • Challenges and Myths of Enterprise Blockchain
    Challenges and Myths of Enterprise Blockchain
    Rao Cherukuri, CTO and James Penney, Director, Product Management Recorded: Nov 14 2018 88 mins
    This webinar will explore:
    •Reality checks of Private Blockchain implementations
    •IAM a key security and foundation layer in Enterprise Blockchain implementations
    •Options to protect private keys and crypto keys
    •Ensuring data security and privacy between participating entities

    With the hype and popularity of crypto currencies, there has been tremendous publicity about Blockchain, the distributed ledger technology and its use cases. The hype around blockchain is growing with the vast majority of Enterprises saying they are “actively involved” in the technology.

    Blockchain relies heavily on Public Key cryptography, but it doesn’t have a defined security model to secure the participating nodes and associated private keys.

    Enterprise private blockchain operations are substantially different, often utilize a permissioned network in which consensus can be achieved through a process called “selective endorsement,” where authorized peers verify the transactions. The advantage of this for businesses is that only participants with the appropriate access and permissions can maintain the transaction ledger. This calls for traditional Enterprise IAM (Identity and Access Management) methodologies to be extended to participating nodes.

    Device Authority specializes in device centric IAM with a focus on automated PKI and security management functions for entities and data. Our KeyScaler platform delivers the entity and data trust at scale for any Enterprise Blockchain implementation.

    Who should attend?
    •Blockchain as a Service Providers
    •Systems Integrators with Blockchain Practices
    •Private Blockchain Platform Providers
    •Healthcare Blockchain Providers
    •IoT Blockchain Providers
  • Identity of Trusted Things: How Identity and Trust became the Center of Security
    Identity of Trusted Things: How Identity and Trust became the Center of Security
    Pan Kamal, Vice President, HID Global and Rao Cherukuri, CTO, Device Authority Recorded: Sep 24 2018 59 mins
    In the new mobile, cloud and social enabled world, the corporate perimeter has dissolved. Experts agree that Identity now has become the new perimeter. However, in an environment where IoT devices are growing at a rate that will soon outpace the number of humans, it is important to not only manage the identity lifecycle of users, but to establish a verifiable identity model that can scale across billions of devices.

    Join this webinar to learn why IT and OT must collaborate to create a comprehensive identity management program that includes digital identities, physical identities and device identities to deliver a holistic view of security.

    To be successful with any IoT implementation, scalable trusted identities which are easy to manage throughout the lifecycle are required.

    Key takeaways

    1. Learn how to establish identities to IoT Devices with unique characteristics and manage those identities at IoT Scale without human intervention
    2. Learn how integrating identity and access management across IT, Physical and Operational boundaries can help close security gaps that are hard to detect
    3. Learn about modern encryption techniques to establish a verifiable device identity and ensure that devices do not get compromised
    4. Learn how enterprise device management can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
    5. Learn how IoT Security is redefining Cyber security to enable Digital Enterprise. Understand the comprehensive IAM (Physical, Digital, Things) model.

Embed in website or blog