Securing the Internet of Things
SEAcurIT-e® is a powerful and practical means of managing secure content, both enabling security functions and providing reliable monitoring and control of users and devices and the data they can access. It offers centralised management and control, but with distributed security and trust, and allows organisations to take full and comprehensive control of security for their Internet of Things (IoT) devices and data.
Information from IoT devices can be encrypted at the device itself or by a management unit prior to Cloud storage, and the information made accessible to all authorised parties while protecting security values against compromise. Initialisation and setup is straightforward, with easy enrolment. Data sets can be assigned to secure folders for ease of processing. Information can be secured and uploaded according to a schedule or by a trigger event, or the upload can be initiated remotely, with security values such as keys or Cloud login credentials not being available to the device at all other times. Alternatively, a Cloud gateway may be employed, where all security functions are applied at the gateway prior to being sent to a Cloud provider.
Once the device information is stored securely in the Cloud, information from multiple devices can be harvested and grouped accordingly to create data sets. Access control and the specification and monitoring of who is able to access which data and when is provided by the SEAcurIT-e® management component, along with features such as the addition of new users or devices, the removal of access, and specifying the period in which data may be accessed.
Multiple distinct data sets for use by different applications or parties can also be prepared and secured on the device side prior to Cloud storage.
The system can also verify the integrity of critical device-resident data and provide access control for tasks such as configuration changes and updates.
SEAcurIT-e® offers the scalability to efficiently handle a very large number of devices, coupled with the management and control features to establish and administer the distribution of encrypted device information across multiple distinct back-end systems.
It also offers power and computational efficiency advantages, as a consequence of the minimal use of public key techniques.