Icon Labs, a provider of security solutions for IoT and edge devices, announces the availability of its new white paper: “Why PKI Matters for the IIoT.” Explaining PKI This new IoT security white paper explains PKI, Authentication, and Certificate Management – how they work, what they are, and how OEMs, manufacturers, and developers can implement the latest technical developments in PKI security technologies. “OEMs building IIoT devices, and enterprises deploying IIoT networks must be proactive by ensuring the proper security capabilities are built into both the devices and the networks in which they operate,” says Alan Grau, President of Icon Labs. “Strong authentication of all devices within an IIoT network is a critical requirement for securing these networks.” Enhancing cybersecurity Cyber-attacks against industrial control systems, water treatment plants, critical infrastructure, and other IIoT networks are on the rise as is the number of devices that hackers can target. As the number of devices grows, so does the range of opportunities to hack those devices, and subsequently alter the data. The bottom line is we now have a growing number of both targets and attacks, so we must put the cyber-security solution in place to protect these devices. Just as cyber-attacks take many forms and exploit a wide range of vulnerabilities in the target device, so too is cybersecurity multi-faceted. A fundamental, but often ignored, aspect of cybersecurity for IIoT devices is strong authentication.
Icon Labs products provide embedded security for IoT and Machine-to-Machine solutions Icon Labs, a provider of security solutions for IoT and edge devices, announced Icon Labs President Alan Grau has been selected to present at Embedded World Show Europe. Alan’s presentation will provide engineers, product managers, and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secure IoT devices. Security management Engineers developing IoT devices have a wide range of choices for adding security to their device. Hardware security elements including TPMs, TEEs and secure elements are available from a variety of vendors. Software security solutions are also available that can provide a variety of features include secure communication, authentication, firewalls, secure boot, secure firmware updates, and security management. The presentation will discuss some recent hacks, cyber security trends, and a detailed overview of IoT security technologies and how they can be applied to secure IoT devices. Specific attention will be paid to the trade-offs and interactions between hardware and software security implementations. Key topics Topics covered include: Hardware security: Description of TPMs, TEEs, TrustZone and other HW security elements and how they are used in IoT devices Software security: Firewalls, encryption, security protocols and secure boot Hardware vs. Software: The role of HW security vs. The role of SW security What security features does your IoT device require? What are the minimum requirements? Scalability issues: How to address security for sensors, endpoints, and gateways System level view of security Embedded securityIcon Labs’ products provide embedded security for IoT and Machine-to-Machine (M2M) solutions in aerospace, industrial, medical control devices, and consumer electronics. The Floodgate Security Framework provides a ‘defense in depth’ solution to protect control units and endpoint devices from cyber threats, aid in compliance with regulatory mandates and guidelines, and gather and report command, event, and device status information for audit requirements.
Phaedrus adds security to their embedded product portfolio and strengthens Icon Labs’ worldwide presence Icon Labs, a leading provider of embedded networking and security technology, today announced that it has selected Phaedrus Systems, the leading specialist in the support of engineers at all stages of embedded safety-critical and high-integrity projects in the United Kingdom, to be the exclusive reseller of Icon Lab’s award winning Floodgate Security Framework. Importance of security for embedded devices “Worldwide, today’s modern industrial automation, utilities, and embedded devices are complex connected systems performing critical functions,” says Alan Grau, CEO of Icon Labs. “Including security in these devices is a critical design task. Cybersecurity is a global problem and OEMs, regardless of their location, need to consider security features early in the design process to ensure the device is protected from advanced cyber-threats, and can meet varying regulatory requirements. Enhanced security increases the value for all end users. Partnering with Phaedrus Systems adds an important dimension to our worldwide presence.” "Icon Labs is the leader in providing cybersecurity - an increasing requirement for embedded systems, particularly in the safety-critical and high-integrity manufacturing sector," says Chris Hills, founder and CTO of Phaedrus Systems. "By adding the Floodgate Security Framework to our portfolio, we now provide developers with the ability to build security into their architecture." Floodgate Security Framework provides foundation for secure, connected devices Icon Labs’ Floodgate Security Framework provides a platform for developing secure, connected devices. The platform is designed to ensure that security is intrinsic to the architecture of the device itself and incorporates security management and visibility, device hardening, data protection, and secure communications. These capabilities provide the foundation for building secure, connected devices. Natively securing the devices simplifies protection, audit, and compliance independent of the secure perimeter, reducing the need for expensive and complicated security appliances. Icon Labs’ Floodgate Security Framework provides: Security policy management Event and command audit log reporting Integration with the McAfee ePolicy orchestrator (ePO) Integrated embedded firewall Firmware and intrusion detection support Support for RTOS and Embedded Linux based devices
3 reasons to migrate to a new access control systemDownload
Schooling the market on education securityDownload
Lawrence, Massachusetts deploys FLIR video system for safetyDownload