InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Integrate IoT security in the Enterprise: Leverage existing security investments

Presented by

Juan Asenjo, Entrust and Julio Merette, Device Authority

About this talk

The majority of Enterprise IoT security implementations need to take existing IT security controls into account and seamlessly interoperate with IoT devices. The challenge is integrating IoT IAM with the traditional Enterprise IAM, Hardware Security Modules (HSMs), and Data Security Platforms. • Enterprises use HSMs for Root of Trust, secure storage of keys, and secure crypto operations. HSMs are used for IoT identity provisioning and data security operations. • Enterprises already use data security platforms for key management and policy-based data access authorization. Integration with these systems is essential for end-to-end data security and compliance. This is required for secure data exchange between IoT devices and other Enterprise resources including enterprise users. • IoT IAM and Enterprise traditional IAM need to interoperate to authorize and share data between the IoT devices, Enterprise systems, and users. Join this session to hear from Device Authority and guest speakers on how to efficiently integrate IoT security in the Enterprise, while also leveraging existing security investments.
Device Authority - IoT Security

Device Authority - IoT Security

6402 subscribers106 talks
Discovery, visibility and automated security
Device Authority enables end to end cyber resilience for connected devices through the discovery, visibility and automated security of large IoT/OT deployments. With device identities outnumbering human identities 82:1 in enterprise environments and as unmanaged devices become a major target for attack, Device Authority’s Discovery Tool and KeyScaler-as-a-Service (KSaaS) platform provide organizations with complete visibility and control of their device identities and vulnerabilities, reducing human error, accelerating incident response, minimizing risk, ensuring complete device and data trust, and enabling trusted AI in any connected environment.​
Related topics