Identity of Trusted Things: How Identity and Trust became the Center of Security

Logo
Presented by

Pan Kamal, Vice President, HID Global and Rao Cherukuri, CTO, Device Authority

About this talk

In the new mobile, cloud and social enabled world, the corporate perimeter has dissolved. Experts agree that Identity now has become the new perimeter. However, in an environment where IoT devices are growing at a rate that will soon outpace the number of humans, it is important to not only manage the identity lifecycle of users, but to establish a verifiable identity model that can scale across billions of devices. Join this webinar to learn why IT and OT must collaborate to create a comprehensive identity management program that includes digital identities, physical identities and device identities to deliver a holistic view of security. To be successful with any IoT implementation, scalable trusted identities which are easy to manage throughout the lifecycle are required. Key takeaways 1. Learn how to establish identities to IoT Devices with unique characteristics and manage those identities at IoT Scale without human intervention 2. Learn how integrating identity and access management across IT, Physical and Operational boundaries can help close security gaps that are hard to detect 3. Learn about modern encryption techniques to establish a verifiable device identity and ensure that devices do not get compromised 4. Learn how enterprise device management can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale. 5. Learn how IoT Security is redefining Cyber security to enable Digital Enterprise. Understand the comprehensive IAM (Physical, Digital, Things) model.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (82)
Subscribers (5405)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.