WebsiteGear Logo Log In
New User? Sign Up
About | Contact | FAQ
  Home News Technology Software Products Tuesday, May 17, 2022 
Add Press Release News | News Feeds Feeds | Email This News Email


Device Authority and Trusted Objects announce end-to-end software security solution for all Edge IoT devices
Tuesday, January 25, 2022

Trusted Objects' TO-protect integration with Device Authority's KeyScaler IoT IAM Platform.

SAN RAMON, Calif. and LONDON, Jan. 18, 2022 /PRNewswire-PRWeb/ -- Device Authority, a global leader in identity and access management (IAM) for the Internet of Things (IoT), and Trusted Objects, a leading player in cybersecurity technologies for embedded systems and cloud device management platforms, today announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform. Last year Trusted Objects joined the KeyScaler Ready program which enabled both teams to work closely together to provide a combined solution for IoT Edge devices.

IoT security solutions must be adapted to manage connected device constraints, including limited computing capabilities, lower cost, power consumption and scalability. Trusted Objects' TO-protect RoT is based on state-of-the-art technologies to protect IoT devices, including innovative embedded secure libraries for generic microcontrollers. TO-protect offers a lower cost alternative to a Secure Element or TPM, enabling:

    --  Easy to integrate on-device software RoT
    --  Prevention against logical and physical security attacks on IoT devices
        exposed to threats
    --  Pre-validated SDKs to work alongside various chipset families
    --  Fully integrated in several IoT chains to achieve a Chain of Trust
    --  Compatible with existing hardware (no redesign / no impact on the BOM),
    --  Easy security retrofit for devices already in the field with MCU FOTA
        (Firmware-Over-The-Air).

Integrating TO-protect with KeyScaler enables full end to end Security Life Cycle management from Edge to Enterprise into any IoT Cloud application e.g. Microsoft Azure, Avnet IoTConnect, AWS, Ericsson, PTC ThingWorx, Google. Utilizing a software RoT in IoT deployments meets the needs for robust device security, at the same time providing scalability to meet the needs of new and legacy device deployments. This software model works incredibly well for distributors such as Avnet, who can provide device software "SKUs" for OEMs and enable Security Lifecycle Management into the Avnet IoTConnect platform, and at the same time saving the customer BOM cost and potential redesigns.

"The integration of TO-protect to KeyScaler showcases how easy it can be to build Edge to Enterprise solutions with KeyScaler, to meet the needs of our customers and channel partners. The Trusted Objects solution offers a disruptive alternative to TPMs and SE where cost and redesign are prohibitive. It's great to see our teams collaborate to bring this software root-of-trust based solution to market" said Darron Antill, CEO of Device Authority.

Sami Anbouba, CEO of Trusted Objects, states: "This partnership is another milestone on our journey in securing the IoT. We have demonstrated that our technologies enable Identity and Access Management for constrained IoT devices securely and at scale.
The integration of our TO-protect software RoT to KeyScaler was very straightforward and we are confident that it will run the same way with our customers."

"Our customers and suppliers are demanding software alternatives to Secure Elements and Trusted Platform Modules. Having Software and Hardware options enables us to serve our OEMs to meet the needs of their Go-To-Markets. Connecting TO-protect to KeyScaler, and KeyScaler to our IoTConnect platform brings Security Lifecycle Management and Automation to our customers, to solve their Identity and Key management challenges that they face every day. This software alternative to secure hardware combined with the secure programming capabilities offered by Avnet Programming Centers make it a viable solution to solve the logistics issue faced by our customers when deploying their products." said Lou Lutostanski, VP Internet Of Things, Avnet.

Learn more about the partnership and technology during a webcast session with Trusted Objects at our Virtual IoT Security Summit here: https://www.deviceauthority.com/webinars/

About Trusted Objects
Trusted Objects is a leading independent player in cybersecurity technologies for embedded systems and cloud device management platforms. Trusted Objects provides innovative solutions including secure software and secure operations to dramatically enhance the whole security chain, from edge device to cloud platform. Thanks to its longstanding expertise, Trusted Objects designs products and solutions that change the game, with a focus on ease of integration and user-friendliness, while complying with the latest standards in terms of security.

Trusted Objects to-security products and services for constrained devices, are positioned to create trust all along the value chain and to cover edge devices, network, cloud and manufacturing.

More information at http://www.trusted-objects.com

About Device Authority
Device Authority is a global leader in identity and access management (IAM) for the Internet of Things (IoT) and focuses on medical/healthcare, industrial, automotive, and smart connected devices. Our KeyScaler platform provides trust for IoT devices and the IoT ecosystem to address the challenges of securing the Internet of Things. KeyScaler uses breakthrough technology, including Dynamic Device Key Generation (DDKG) and PKI Signature+ that delivers simplicity and trust to IoT devices. This solution delivers automated device provisioning, authentication, credential management, policy-based end-to-end data security/encryption and secure updates.

With offices in San Ramon, California, and Reading, UK, Device Authority partners with the leading IoT ecosystem providers, including AWS, Ericsson, Entrust, HID Global, Microsoft, PTC, Thales, Venafi, Wipro and more. Keep updated by visiting http://www.deviceauthority.com, following @DeviceAuthority and subscribing to our BrightTALK channel.

Media Contact

Hervé ROCHE, VP Marketing, Trusted Objects, +33 4 42 39 86 30, contact@trusted-objects.com

SOURCE Trusted Objects



Email This News Email | Submit To Slashdot Slashdot | Submit To Digg.com Digg | Submit To del.icio.us Del.icio.us | News Feeds Feeds

RELATED NEWS ARTICLES
Nav Key Trends and Opportunities in the Global Metaverse Technology Market: The Metaverse vs Digital Twin | May 17, 2022
Nav The Worldwide Speech-to-text API Industry is Expected to Reach $5.8 Billion by 2027 | May 17, 2022
Nav Global Cyber Security: Technologies and Markets (2022-2024) by Type, Solution, Deployment Mode, End User and Region | May 17, 2022
Nav Encova Insurance Transforms its Workers' Compensation Offering with Sapiens Solutions | May 17, 2022
Nav AERAS SUPPORTS A SUCCESSFUL & CLEAN KENTUCKY DERBY | May 17, 2022
Nav At 12.9% CAGR of Population Health Management Market Size Worth $51.2 Billion by 2028: Zion Market Research | May 17, 2022
Nav Global Automation Testing Market (2022 to 2030) - Share, Size, Trends, Industry Analysis Report | May 17, 2022
Nav PCS Software Quarterly Innovation Update - Second Quarter, 2022 | May 17, 2022
Nav Global Application Security Market (2022 to 2027) - Industry Trends, Share, Size, Growth, Opportunity and Forecasts | May 17, 2022
Nav Global 5G System Integration (Services) Market Size & Share Estimated to be Worth $45.5 Billion By 2027 | CAGR of 25.4%: Polaris Market Research | May 17, 2022
NEWS SEARCH

FEATURED NEWS | POPULAR NEWS
Submit News | View More News View More News