How to enhance and manage your IoT security in a Microsoft Azure environment

Presented by

James Penney, Device Authority and Ian Banham, Microsoft

About this talk

IoT platforms like Microsoft Azure IoT provide several capabilities and features to build and deploy IoT applications, solutions and services in a better, faster, more cost-effective and integrated way. IoT platforms also provide quick interconnection of assets and support a wide variety of operating systems and devices. While the IoT Platform vendors and ecosystem partners continue to evolve, security is still the #1 concern for its adoption. This is introduced by the scale of IoT, its unique characteristics, disparate components involved, as well as the consequences of compromised security. The IoT continues to grow rapidly but concerns about security remain a significant barrier and are hindering the adoption. Enterprise IoT security solutions typically use owner-controlled security posture and need to integrate with IoT Platforms’ device and data management. The webinar discussion will include: • Challenges of building, deploying and securing IoT – on premise and in the cloud • A real world Automotive / Connected Car use case; the problem/challenge and the solution • The value of Microsoft Azure IoT together with KeyScaler

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (53)
Subscribers (4229)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.