Automating Device Security at IoT Scale

Logo
Presented by

Srinivas Akella - Founder and CTO, WootCloud and Rao Cherukuri, CSO, Device Authority

About this talk

With the explosion in the number and types of connected devices lacking Security by Design architecture, developing rich device context is of critical importance to ensure network security and access control. There is also a growing regulatory demand to audit all devices on the network, for stronger device hygiene and access restrictions. WootCloud’s award-winning ML/AI Hyper-Context Security Platform provides contextualized visibility and analytics for all devices, and uses this intelligence to segment the network, correlate threats and vulnerability propagation across interfaces and automate access control. This interactive live session will demonstrate how WootCloud HyperContext® delivers a deep understanding of all devices entering/exiting your network. In addition, you will learn how HyperContext stitches together a comprehensive understanding of the risks and threats, and generates strong access control policies to automate device security at IoT scale. Key Takeaways: 1. How to Detect, Inspect, Defend every device in your organization at IoT scale using device context. 2. Understand why HyperContext® is more powerful than the current fingerprinting solutions. 3. Automate access control and supercharge your existing security investments with strong integrations. 4. Understand why HyperContext® is an essential part of moving towards IoT platforms and Security by Design.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (82)
Subscribers (5421)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.