Hi [[ session.user.profile.firstName ]]

How to protect IoT devices during manufacturing stage with secure provisioning

The Internet of Things (IoT) is transforming our homes, cars, hospitals, businesses and public spaces – mostly for the better – but without suitable precautions (security, privacy) IoT devices can be an attractive target for malicious actors and cyberattacks.

When embarking on an IoT project, or designing a new connected device or product, it’s important to factor in security early on. The potential impact of an IoT security breach is forcing a suitable security model from the design and manufacturing phase which supports secure production; the secure provisioning of root keys and certificates at the time of manufacturing, secure mastering, and a foundation for secure updates.

Join our webinar to learn more about:
• The challenges and risks of IoT
• The need for a Secure by Design approach
• Guideline and solutions to mitigate the risks
• Real world examples

We are delighted to be joined by EPS Global. There will be an opportunity to ask the speakers questions during the live session. If you’re watching on demand and have a question, please email info@deviceauthority.com
Recorded Oct 14 2020 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brian Colgan, EPS Global and Paul Lockley, Device Authority
Presentation preview: How to protect IoT devices during manufacturing stage with secure provisioning

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Secure by Design: IoT Security Lifecycle Management with Microsoft Azure Sphere Nov 4 2020 4:00 pm UTC 45 mins
    Josh Nash, Microsoft and James Penney, Device Authority
    Microsoft has developed a plethora of features and flexible interfaces for building IoT solutions with their Azure IoT platform. The rich set of components in Azure enable customers to adopt the right integration and policies as per their application requirements.

    One of Microsoft’s latest additions, Azure Sphere, addresses an important Secure by Design foundation in IoT for devices, taking a step forward to help monitor security, and also provides a secure software update mechanism for these devices. This approach is solving a foundational challenge that we articulate in step 1 of our Enterprise IoT security model; secure production – where root keys are provisioned.

    In this webinar you will learn about:
     The 7 properties of highly secure devices
     The importance of network security
     Steps to connect production devices to IoT platforms/applications without human intervention
     The environment for managing IoT devices through their security lifecycle

    The webinar will include a short demonstration of Microsoft Azure Sphere and Device Authority KeyScaler.

    Sign up today and watch live or on demand.


    Who should attend?
    This webinar is ideal for anyone starting or currently on their IoT journey, looking for guidance or advice on IoT security solutions that scale for hundreds, thousands or even millions of devices.

    The level of content will be suitable for CXOs, VP, Head of, Product Managers, Security Managers, Solutions Architects, and Security Engineers.
  • How to protect IoT devices during manufacturing stage with secure provisioning Recorded: Oct 14 2020 35 mins
    Brian Colgan, EPS Global and Paul Lockley, Device Authority
    The Internet of Things (IoT) is transforming our homes, cars, hospitals, businesses and public spaces – mostly for the better – but without suitable precautions (security, privacy) IoT devices can be an attractive target for malicious actors and cyberattacks.

    When embarking on an IoT project, or designing a new connected device or product, it’s important to factor in security early on. The potential impact of an IoT security breach is forcing a suitable security model from the design and manufacturing phase which supports secure production; the secure provisioning of root keys and certificates at the time of manufacturing, secure mastering, and a foundation for secure updates.

    Join our webinar to learn more about:
    • The challenges and risks of IoT
    • The need for a Secure by Design approach
    • Guideline and solutions to mitigate the risks
    • Real world examples

    We are delighted to be joined by EPS Global. There will be an opportunity to ask the speakers questions during the live session. If you’re watching on demand and have a question, please email info@deviceauthority.com
  • Internet of Medical Things: What is it and how do you secure it? Recorded: Sep 30 2020 31 mins
    Paul de Curnou and Julio Merette, Device Authority
    The Internet of Medical Things is a blend of medical devices and applications that can improve healthcare outcomes. Discover how and why healthcare leaders are prioritizing the biggest IoMT business opportunities. Learn how medical IoT is transforming the healthcare industry and how to protect your organization against cyber attacks.

    Join our webinar to learn more about:
    • What is the Internet of Medical Things or Healthcare IoT?
    • What are the challenges and risks?
    • Real world examples

    There will be an opportunity to ask the speakers questions during the live session. If you’re watching on demand and have a question, please email info@deviceauthority.com
  • IoT Security Made Easy: How to implement secure code signing and update delivery Recorded: Jul 15 2020 29 mins
    Eddie Glenn, Venafi and Nirmal Misra, Device Authority
    As the number of IoT devices & apps continues to grow, so does the need for secure code signing & update delivery.

    Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

    Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

    Join this webinar to:
    • Learn why code signing is important, in particular for IoT
    • Understand how CodeSign Protect helps organisations today
    • Explore a demo of a practical implementation of code-signing and secure update delivery for IoT
  • Meeting Demand for Telemedicine with Secure IoT Solutions Recorded: Jun 3 2020 47 mins
    James Penney and Julio Merette, Device Authority and Juan Asenjo, nCipher Security
    Learn how healthcare providers & hospitals can leverage IoT technology to deliver safe routine care.

    As front-line healthcare workers address the novel coronavirus pandemic, optimization of healthcare resources has become critical. In parallel, healthcare professionals delivering routine care must continue to treat their patients with existing conditions. The current situation is testing telemedicine’s ability to deliver safe and secure routine medical care.

    Telemedicine, along with remote monitoring and diagnostic capabilities, enable the delivery of routine care, particularly during times when face-to-face appointments are not always possible or deemed essential. Being able deliver these services safely and securely is critical.

    This webinar will explore how healthcare service providers and hospitals can leverage telemedicine and IoT technology to help tackle resource constraints and continue to deliver safe routine care.

    Telemedicine and the deployment of connected/IoT medical devices enables doctors to continue to deliver care remotely. Ensuring the safety and security of this delivery method relies on the privacy and integrity of data collected from patients.

    Before the pandemic, Forbes had predicted that approximately 161 million connected medical devices were going to be deployed in hospitals, clinics, and medical offices by 2020. However, along with the growing digitization of medical records and services comes rising cybersecurity threats. Not only is privacy a concern, but integrity is paramount in order to ensure patient safety and trust.

    Join this webcast to learn how:
    • Technology can help healthcare practitioners deliver routine care at a time when people can’t or don’t want to visit a doctors’ office
    • Telemedicine platform/service providers can enhance security with trusted device authentication and data protection
    • Secure IoT can deliver more comprehensive and safe telemedicine services
  • Ensuring operational resilience of Healthcare through effective IoT Security Recorded: May 20 2020 55 mins
    Mark Brown, Wipro; Justin Dyer, Microsoft; Rao Cherukuri, Device Authority
    Join Microsoft, Wipro & Device Authority to learn about IoT security for hospitals & medical devices, security best practices to mitigate the risks/threats, and real-world customer use case for how to protect your devices.

    In recent years, technological innovation has delivered another wave of digital transformation to the healthcare industry. With advances in cloud computing and IoT, more connected devices are being used to monitor patients, make diagnoses and even administer treatments. Some of these devices are located in hospitals, in patients’ homes, or on the patients themselves as wearables, and in-home healthcare will increase as a result. Along with the added convenience and lower cost of medical care provided by smart connected medical devices come increased security threats.

    With the current COVID-19 pandemic, there has been an increase in the number of medical devices required in hospitals to monitor and treat patients. Many of these devices are smart/connected to the internet and transmit sensitive data. This raises the importance of the safety and security of the devices, applications and data they generate.

    Join this virtual event to hear from Microsoft, Wipro and Device Authority, and learn about:
    • Current IoT security threats within hospitals and medical devices
    • Security best practices to mitigate the risks/threats
    • A real-world customer use case for how to protect your devices
  • Kick start your IoT project securely in an hour with Azure and KeyScaler Recorded: Apr 29 2020 30 mins
    Nirmal Misra, Device Authority and Jeff Cornwell, Microsoft
    Hear from Microsoft and Device Authority about how easy it is to get started on your IoT journey today with Azure Marketplace and KeyScaler.

    This session will include a demonstration.

    You are always welcome to ask questions to our speakers.
  • Tech CEO Talk: Advice for medical device & health service providers using IoT/VR Recorded: Apr 21 2020 46 mins
    Device Authority, Fundamental VR, InVMA, Wyld Networks
    Join our new Tech Talk series! The first one hosts a panel of CEOs from the IoT and Virtual Reality ecosystem, including Fundamental VR, InVMA, Wyld Networks and Device Authority.

    We’ll ask the opening question, "What advice/help/tips can you give to medical device manufacturers or healthcare service providers leveraging VR & IoT?", they will provide their best advice to guide you, and then it’s over to the audience to ask even more questions.
  • IoT Security 101: Why a secure code signing process is critical for IoT Recorded: Mar 11 2020 50 mins
    Eddie Glenn, Venafi and James Penney, Device Authority
    As the number of Internet of Things devices and applications continues to grow in 2020, so does the need for secure code signing and update delivery.

    Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems from Microsoft, ASUS, and others to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

    Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

    Join this webinar to learn about:
    • Current attack surfaces / risks being exploited within IoT
    • Why code signing is exceedingly valuable for IoT
    • Methods for Next-Gen Code Signing
    • How secure update delivery can benefit your IoT use case
    • Real world examples
  • Cybersecurity & IoT: Solving Industry 4.0 challenges and enabling your business Recorded: Feb 12 2020 62 mins
    Mark Brown and Shyamkant Dhamke, Wipro and Robert Dobson, Device Authority
    2019 saw widespread adoption of the Internet of Things (IoT) – compounding the pace of the Industrial Internet of Things (IIoT) which delivered new technology opportunities but also risks to global Enterprises.

    Gartner, Inc. forecasts that the enterprise and automotive Internet of Things (IoT) market* will grow to 5.8 billion endpoints in 2020, a 21% increase from 2019.

    With the increased volume of IoT devices and more government regulations coming in, data privacy and security have become paramount when designing and building IoT solutions. Security will continue to be a key decision factor for organizations when deploying IoT infrastructure.

    The need for Security by Design and Automation to deal with the scale and unique characteristics of IoT will evolve and mature throughout 2020. Many organizations lack the experience and expertise to respond to IIoT challenges. They are looking to a trusted partner to solve their IoT security challenges and mitigate risk, while also enabling their revenue generation.

    Join this webinar to learn about:
    • The current state of cybersecurity and the IoT ecosystem
    • Real world experiences demonstrating the challenges and risks of IoT security including legislation e.g. GDPR, HIPAA, California Senate Bill, UK government
    • Solutions to overcome challenges and enable your business to grasp Industry 4.0 opportunities
    • Predictions/expectations for 2020 and beyond
  • Webinar - Building IoT security: cloud connected does not mean less protected Recorded: Jan 21 2020 60 mins
    James Penney - Chief Technology Officer, Device Authority and Juan Asenjo - Dir. Marketing, nCipher Security
    The Internet of Things (IoT) presents a business opportunity across almost every industry. But to be successful, IoT security must become a primary focus. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the legal and safety consequences of compromised security.

    It’s one thing to connect an IoT device, but how do you manage the security lifecycle of thousands, possibly millions of devices? Often devices are in the field for 5-10 years. The management of these devices can become a resource headache with high costs if dealt with manually. Not to mention the risk of human error.

    Today there are various IoT platforms available to connect your devices, applications and data to in order to gain valuable insights. Microsoft Azure IoT is a popular choice and will be a focus point for the discussion.

    Join this webinar to:

    • Learn about at recent IoT breaches
    • Discover key aspects of managing IoT security operations and applying IoT lifecycle management
    • Explore best practice for building an IoT root of trust using Microsoft Azure
    • Find out about HSM as a Service and its key benefits
    • Learn about real IoT use cases: How to overcome/mitigate security risks in a cost-effective way
  • How to enhance and manage your IoT security in a Microsoft Azure environment Recorded: Oct 16 2019 52 mins
    James Penney, Device Authority and Ian Banham, Microsoft
    IoT platforms like Microsoft Azure IoT provide several capabilities and features to build and deploy IoT applications, solutions and services in a better, faster, more cost-effective and integrated way. IoT platforms also provide quick interconnection of assets and support a wide variety of operating systems and devices.

    While the IoT Platform vendors and ecosystem partners continue to evolve, security is still the #1 concern for its adoption. This is introduced by the scale of IoT, its unique characteristics, disparate components involved, as well as the consequences of compromised security. The IoT continues to grow rapidly but concerns about security remain a significant barrier and are hindering the adoption.

    Enterprise IoT security solutions typically use owner-controlled security posture
    and need to integrate with IoT Platforms’ device and data management.

    The webinar discussion will include:

    • Challenges of building, deploying and securing IoT – on premise and in the cloud
    • A real world Automotive / Connected Car use case; the problem/challenge and the solution
    • The value of Microsoft Azure IoT together with KeyScaler
  • How to Automate your PKI and Data Security for IoT Recorded: Sep 25 2019 57 mins
    Paul Hampton, Thales and Rob Dobson, Device Authority
    The Internet of Things (IoT) holds huge potential for your organization, but if you’re like most, you still have concerns about security. How can you be sure that the IoT solutions you deploy will enable you to guarantee the security of your organization and your customers?

    IoT will be a game changer due to the scope of data and devices, but it also promises to change the security paradigm. The future of IoT will rely on the ability to create a foundation of security, trust, and data integrity, whilst being able to seamlessly manage countless numbers of devices.

    Today there is no single vendor responsible for securing IoT. It takes an entire ecosystem of solutions providers working together and playing their part to ensure end-to-end security across the device, network and application.

    In this webinar, experts from Thales and Device Authority will share their industry expertise, looking at security risks of IoT devices and infrastructures across many industries including medical devices, industrial manufacturing and automotive - exploring what learnings can be implemented today. You can explore how you can take the first steps to keeping your IoT devices and data secure, and your organization and customers safe.

    The agenda will include a discussion around:
    • Risks and Challenges of IoT
    • Why use PKI for IoT?
    • How to automate security operations and management
    • Bring Your Own Key (BYOK)
    • Examples / Use Cases – Medical, Industrial, Automotive etc.
    • Thales & Device Authority Solution
  • How to reduce IoT device onboarding time to seconds and improve IoT security Recorded: Aug 14 2019 57 mins
    Richard Kerslake, Intel and James Penney, Device Authority
    Want to realize faster IoT device onboarding with additional security capabilities such as credential management and data security?

    Today, a manual process exists where device ownership is transferred, activated in the field, configured on the network, and registered with the device owner in an IoT management platform. This time-intensive and costly process is fraught with security holes, as exemplified by recent large-scale attacks in which device manufacturers have shipped default credentials that were co-opted for botnet-style DNS attacks.

    Imagine you’re going to install 10,000 smart light bulbs in a factory. How much time should you schedule? Before they can start streaming data, you need to key in each device identity, coordinate network credentials with IT, and register each device with the operational technology (OT) smart building control platform. If you guessed 20 minutes per bulb, you’re about right. For 10,000 bulbs, you’d need almost two years!

    You can imagine that if you have thousands and thousands of devices in larger projects this leads to quite some costs.

    Once you’ve onboarded the devices, what next?
    Do you need help managing credentials such as PKI certificates or default passwords?
    Do you have the correct level of data security and privacy for your use case?
    Are you leveraging automation without human intervention for IoT devices out in the wild?

    With speakers from Intel and Device Authority, the discussion will include:
    • Secure by Design: An approach to address IoT security challenges
    • Ownership transfer, zero-touch onboarding and registering of devices (in seconds!)
    • Credential management
    • Data security
    • Automation
  • 5 Easy Steps to Connect and Secure IoT Devices Recorded: Jun 6 2019 50 mins
    Robert Dobson, Device Authority and Jon Hill, InVMA
    Sign up to this webinar to learn:
    - How to connect your devices
    - Challenges of securing devices, applications and data, and how to overcome them
    - Real world examples of secure connected devices for Industrial and Healthcare

    IoT adoption has increased in recent years due to the benefits gained by organizations in almost every industry, just by connecting their devices to the internet. Connected sensors, actuators and edge nodes enable companies to pick up on inefficiencies and problems sooner and save time and money while supporting business intelligence efforts.

    In manufacturing specifically, IIoT holds great potential for quality control, sustainable and green practices, supply chain traceability and overall supply chain efficiency. In an industrial setting, IIoT is key to processes such as predictive maintenance, enhanced field service, energy management and asset tracking.

    The IoT has the potential to create a world where billions of devices can connect and communicate seamlessly. But bridging the gap between the digital and physical has proven harder than expected. Most deployments were brownfield and required technological, architectural, and organizational integration with legacy solutions.

    In addition, Security has turned out to be one of the greatest barriers to widespread IoT adoption. The good news is that we’ve come to recognize a secure by design approach as the most viable security option for organizations in IIoT, healthcare and smart connected products. Security architectures must be flexible and allow for multi-vendor collaboration. Ultimately, a security solution which prevents and protects against security attacks is better than a detect and respond method which many traditional IT security vendors offer today.
  • Five Tips for Securing and Managing your IoT environment with PKI Recorded: Apr 30 2019 53 mins
    Vishvas Patel, VP Product & Chief Architect and Rao Cherukuri, CTO
    Learn how
    1. to use PKI for strong authentication, data encryption & code signing for IoT devices;
    2. to establish identities to IoT Devices with unique characteristics and manage those identities at IoT scale without human intervention;
    3. modern encryption techniques are used to establish a verifiable device identity and ensure that devices do not get compromised; and
    4. IoT IAM can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
    5. to enforce identity and access through online AND offline authentication

    With over a billion connected devices worldwide, Internet of Things (IoT) security remains top concerns for companies of all sizes. The growth of ransomware and IoT-specific botnets such as Mirai and Reaper have heightened awareness and security concerns of IoT devices. Even though many organizations may not have been victimized by IoT security breaches yet, they must start assessing their IoT security strategy and how to leverage IoT IAM technologies to reduce IoT security risk.

    Join this webinar to learn how you can leverage Public Key Infrastructure (PKI) with the scalability and automation for strong authentication and data protection through encryption. We will explore how this is relevant for different industries including national and local Government, Education and Healthcare.
  • Cyber Security vs. Cyber Safety – Are Medical Devices Secure and Patients Safe? Recorded: Feb 19 2019 61 mins
    Juan Asenjo, nCipher Security and Rao Cherukuri, Device Authority
    Learn about the main challenges for securing connected medical devices, including how to design and deploy scalable credential management systems, end-to-end data security, at rest, in motion, using encryption, establishing enforceable security policies for regulatory compliance and creating root of trust with certified HSMs to deliver patient safety.

    The Internet of Things (IoT) holds enormous potential across a wide range of applications. From industrial sensors that manage and optimize manufacturing processes, to medical devices that monitor and deliver specialized treatment. However, to realize this potential, security and safety must become the primary focus for deployment. In this webinar, Rao Cherukuri - CTO of Device Authority, a leading provider of IoT identity and access management solutions and Juan Asenjo - Senior Manager at nCipher Security, pioneers in the development of hardware security modules (HSMs), will discuss breakthrough technology that delivers automated device provisioning, authentication, credential management, and end-to-end data privacy, with a robust root of trust.

    Sign up now to save your seat on our webinar!
  • Internet of Medical Things: How to Design and Deliver Secure Connected Products Recorded: Nov 20 2018 59 mins
    Device Authority – Rob Dobson, PTC – Stefan Küsgen, SyroCon – Thomas Baumgart
    The Internet of Medical Things, or Healthcare IoT, refers to a connected infrastructure of medical devices and software applications that can communicate with various healthcare IT systems. Frost & Sullivan estimates that there were 4.5 billion IoMT devices in 2015, a number that they expect to increase to between 20 and 30 billion by 2020.

    As the IoMT device landscape heats up and hospitals delve more into remote care, healthcare systems need to protect each and every IoT device from potential cybersecurity risks. To do this, medical device manufacturers should integrate the power of automation into a rock-solid digital technology foundation, making it easier to stay on top of the security needed to protect both the device and the patient, while also adhering to regulatory compliance.

    Hear from Device Authority, SyroCon and PTC on a real customer use case which encourages building secure connected IoT medical devices. Learn about potential benefits, best practices and key challenges, and how they can be solved with out of the box solutions and integrations between PTC, SyroCon and Device Authority.
  • Challenges and Myths of Enterprise Blockchain Recorded: Nov 14 2018 48 mins
    Rao Cherukuri, CTO and James Penney, Director, Product Management
    This webinar will explore:
    •Reality checks of Private Blockchain implementations
    •IAM a key security and foundation layer in Enterprise Blockchain implementations
    •Options to protect private keys and crypto keys
    •Ensuring data security and privacy between participating entities

    With the hype and popularity of crypto currencies, there has been tremendous publicity about Blockchain, the distributed ledger technology and its use cases. The hype around blockchain is growing with the vast majority of Enterprises saying they are “actively involved” in the technology.

    Blockchain relies heavily on Public Key cryptography, but it doesn’t have a defined security model to secure the participating nodes and associated private keys.

    Enterprise private blockchain operations are substantially different, often utilize a permissioned network in which consensus can be achieved through a process called “selective endorsement,” where authorized peers verify the transactions. The advantage of this for businesses is that only participants with the appropriate access and permissions can maintain the transaction ledger. This calls for traditional Enterprise IAM (Identity and Access Management) methodologies to be extended to participating nodes.

    Device Authority specializes in device centric IAM with a focus on automated PKI and security management functions for entities and data. Our KeyScaler platform delivers the entity and data trust at scale for any Enterprise Blockchain implementation.

    Who should attend?
    •Blockchain as a Service Providers
    •Systems Integrators with Blockchain Practices
    •Private Blockchain Platform Providers
    •Healthcare Blockchain Providers
    •IoT Blockchain Providers
  • Identity of Trusted Things: How Identity and Trust became the Center of Security Recorded: Sep 24 2018 59 mins
    Pan Kamal, Vice President, HID Global and Rao Cherukuri, CTO, Device Authority
    In the new mobile, cloud and social enabled world, the corporate perimeter has dissolved. Experts agree that Identity now has become the new perimeter. However, in an environment where IoT devices are growing at a rate that will soon outpace the number of humans, it is important to not only manage the identity lifecycle of users, but to establish a verifiable identity model that can scale across billions of devices.

    Join this webinar to learn why IT and OT must collaborate to create a comprehensive identity management program that includes digital identities, physical identities and device identities to deliver a holistic view of security.

    To be successful with any IoT implementation, scalable trusted identities which are easy to manage throughout the lifecycle are required.

    Key takeaways

    1. Learn how to establish identities to IoT Devices with unique characteristics and manage those identities at IoT Scale without human intervention
    2. Learn how integrating identity and access management across IT, Physical and Operational boundaries can help close security gaps that are hard to detect
    3. Learn about modern encryption techniques to establish a verifiable device identity and ensure that devices do not get compromised
    4. Learn how enterprise device management can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
    5. Learn how IoT Security is redefining Cyber security to enable Digital Enterprise. Understand the comprehensive IAM (Physical, Digital, Things) model.
Trust for every Thing
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler.

IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to protect IoT devices during manufacturing stage with secure provisioning
  • Live at: Oct 14 2020 3:00 pm
  • Presented by: Brian Colgan, EPS Global and Paul Lockley, Device Authority
  • From:
Your email has been sent.
or close