Device Authority and Trusted Objects Announce End-To-End Software Security Solution for All Edge IoT Devices
Trusted Objects’ TO-protect integration with Device Authority’s KeyScaler IoT IAM Platform
Device Authority, a global leader in identity and access management (IAM) for the Internet of Things (IoT), and Trusted Objects, a leading player in cybersecurity technologies for embedded systems and cloud device management platforms, announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform. Last year Trusted Objects joined the KeyScaler Ready program which enabled both teams to work closely together to provide a combined solution for IoT Edge devices.
IoT security solutions must be adapted to manage connected device constraints, including limited computing capabilities, lower cost, power consumption and scalability. Trusted Objects’ TO-protect RoT is based on state-of-the-art technologies to protect IoT devices, including innovative embedded secure libraries for generic microcontrollers. TO-protect offers a lower cost alternative to a Secure Element or TPM, enabling:
- Easy to integrate on-device software RoT
- Prevention against logical and physical security attacks on IoT devices exposed to threats
- Pre-validated SDKs to work alongside various chipset families
- Fully integrated in several IoT chains to achieve a Chain of Trust
- Compatible with existing hardware (no redesign / no impact on the BOM),
- Easy security retrofit for devices already in the field with MCU FOTA (Firmware-Over-The-Air).
Recommended AI News: Intersec 5G-Ready Geolocation Platform Accelerates Positioning Use Case Enablement
Integrating TO-protect with KeyScaler enables full end to end Security Life Cycle management from Edge to Enterprise into any IoT Cloud application e.g. Microsoft Azure, Avnet IoTConnect, AWS, Ericsson, PTC ThingWorx, Google. Utilizing a software RoT in IoT deployments meets the needs for robust device security, at the same time providing scalability to meet the needs of new and legacy device deployments. This software model works incredibly well for distributors such as Avnet, who can provide device software “SKUs” for OEMs and enable Security Lifecycle Management into the Avnet IoTConnect platform, and at the same time saving the customer BOM cost and potential redesigns.
“The integration of TO-protect to KeyScaler showcases how easy it can be to build Edge to Enterprise solutions with KeyScaler, to meet the needs of our customers and channel partners. The Trusted Objects solution offers a disruptive alternative to TPMs and SE where cost and redesign are prohibitive. It’s great to see our teams collaborate to bring this software root-of-trust based solution to market” said Darron Antill, CEO of Device Authority.
Sami Anbouba, CEO of Trusted Objects, states: “This partnership is another milestone on our journey in securing the IoT. We have demonstrated that our technologies enable Identity and Access Management for constrained IoT devices securely and at scale.
Recommended AI News: HawkEye 360 Announces Kate Zimmerman as Chief Data Scientist
The integration of our TO-protect software RoT to KeyScaler was very straightforward and we are confident that it will run the same way with our customers.”
“Our customers and suppliers are demanding software alternatives to Secure Elements and Trusted Platform Modules. Having Software and Hardware options enables us to serve our OEMs to meet the needs of their Go-To-Markets. Connecting TO-protect to KeyScaler, and KeyScaler to our IoT Connect platform brings Security Lifecycle Management and Automation to our customers, to solve their Identity and Key management challenges that they face every day. This software alternative to secure hardware combined with the secure programming capabilities offered by Avnet Programming Centers make it a viable solution to solve the logistics issue faced by our customers when deploying their products.” said Lou Lutostanski, VP Internet Of Things, Avnet.
Recommended AI News: Cyndx Private Market Data Now Available In Eight Languages
[To share your insights with us, please write to email@example.com]