Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Safe-T Protects Industrial IoT Networks with Zero Trust Solution

0

Announces New Version to Protect IIOT Customers from IoT Devices

Safe-T® , a provider of Software-defined Access (SDA) solutions for the hybrid cloud, announced the launch of a new version of its Software Defined Perimeter (SDP) solution, designed for Industrial Internet Of Things (or IIOT)  organizations. The new version extends the Zero Trust network and SDP solution to the world of IOT.

In recent years, IOT devices have become an important element across a wide range of industries. For instance, devices such as remote meters and connected lighting are now commonplace in any organization. With the increase of IOT devices, there has been a rise in the emergence of IOT security vendors. Until now, these vendors have focused on protecting the device itself from hackers, while leaving the organization to defend their data with legacy solutions that fail to address the unique requirements of IOT.

Read More: China Builds the World’s First Autonomous Boat Capable of Carrying Weather Surveillance Rockets

Safe-T, having the know-how and expertise in Zero Trust network design and SDP, has recognized this need and developed the first-ever SDP solution, protecting not only the IOT devices but also the IIOT organizations’ data center from remote IOT devices.

Safe-T’s Zero Trust solution is built on the company’s patented reverse-access technology platform, which reduces the attack surface of the IIOT network by controlling which IOT device can access the backend systems (meter data management systems, IOT platforms, etc.), enabling “qualified” IOT devices to participate in a Zero Trust strategy.

Safe-T’s new solution achieves this by forcing the IOT device to authenticate first before being granted access. Authentication can be done by sending a predefined token or credentials from the IOT devices to Safe-T’s SDP solution. Only after Safe-T’s secure access solution has authenticated the IOT device, it is granted on-demand access to the specific backend system.

Read More: Newest Veritone aiWARE Enhancements Enable Customers to Expand and Accelerate Their Adoption of AI

This process of authentication first, access later, ensures that breached/hacked IOT devices or IOT devices which do not have the Safe-T API (Application Programing Interface) will never be granted access to the IIOT network.

“Today, Zero Trust vendors mainly target humans, but they are exceeded by the number of applications and IOT devices trying to access backend systems and we haven’t seen Zero Trust vendors trying to tackle this issue,” said Eitan Bremler, VP Technology at Safe-T. “Recognizing this potential problem, we adapted our Software Defined Perimeter solution to support application-to-application use cases, as well as IOT-to-application use cases.”

In addition to supporting IOT devices, Safe-T’s secure access solution also supports IOT bridges to which IOT devices connect. This reduces the changes required on the IOT device, and instead has the IOT bridge perform the authentication on behalf of the device.

Read More: The Drone Racing League Launches 2019 Season with Twitter and NBC

Leave A Reply

Your email address will not be published.