Integrate IoT security in the Enterprise: Leverage existing security investments

Logo
Presented by

Juan Asenjo, Entrust and Julio Merette, Device Authority

About this talk

The majority of Enterprise IoT security implementations need to take existing IT security controls into account and seamlessly interoperate with IoT devices. The challenge is integrating IoT IAM with the traditional Enterprise IAM, Hardware Security Modules (HSMs), and Data Security Platforms. • Enterprises use HSMs for Root of Trust, secure storage of keys, and secure crypto operations. HSMs are used for IoT identity provisioning and data security operations. • Enterprises already use data security platforms for key management and policy-based data access authorization. Integration with these systems is essential for end-to-end data security and compliance. This is required for secure data exchange between IoT devices and other Enterprise resources including enterprise users. • IoT IAM and Enterprise traditional IAM need to interoperate to authorize and share data between the IoT devices, Enterprise systems, and users. Join this session to hear from Device Authority and guest speakers on how to efficiently integrate IoT security in the Enterprise, while also leveraging existing security investments.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (82)
Subscribers (5389)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.