Building security within IoT devices:Security by design & supply chain integrity

Logo
Presented by

Marc Canel, Imagination Technologies and Rob Dobson, Device Authority

About this talk

IoT devices are typically built for a specific application. The user manages the binding of the device to its cloud application through error prone manual processes. This cumbersome and risky approach prevents large-scale adoption. Single purpose devices adds cost and complexity. It's an industry wide issue driven by the fragmentation of the IoT marketplace and the desire of actors for differentiation. This presentation will cover: • The industry's need to find remedies to security and supply chain problems • Industry wide collaboration to design protocols for provisioning and on-boarding • The importance of removing manual and password driven operations
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (82)
Subscribers (5503)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.