How to reduce IoT device onboarding time to seconds and improve IoT security

Presented by

Richard Kerslake, Intel and James Penney, Device Authority

About this talk

Want to realize faster IoT device onboarding with additional security capabilities such as credential management and data security? Today, a manual process exists where device ownership is transferred, activated in the field, configured on the network, and registered with the device owner in an IoT management platform. This time-intensive and costly process is fraught with security holes, as exemplified by recent large-scale attacks in which device manufacturers have shipped default credentials that were co-opted for botnet-style DNS attacks. Imagine you’re going to install 10,000 smart light bulbs in a factory. How much time should you schedule? Before they can start streaming data, you need to key in each device identity, coordinate network credentials with IT, and register each device with the operational technology (OT) smart building control platform. If you guessed 20 minutes per bulb, you’re about right. For 10,000 bulbs, you’d need almost two years! You can imagine that if you have thousands and thousands of devices in larger projects this leads to quite some costs. Once you’ve onboarded the devices, what next? Do you need help managing credentials such as PKI certificates or default passwords? Do you have the correct level of data security and privacy for your use case? Are you leveraging automation without human intervention for IoT devices out in the wild? With speakers from Intel and Device Authority, the discussion will include: • Secure by Design: An approach to address IoT security challenges • Ownership transfer, zero-touch onboarding and registering of devices (in seconds!) • Credential management • Data security • Automation

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (64)
Subscribers (4627)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.