Icon Labs - Experts & Thought Leaders
Latest Icon Labs news & announcements
Sectigo, a foremost provider of automated digital identity management and web security solutions, has acquired SSL247, the biggest SSL certificate and web security provider in the UK and France, and Xolphin, the largest provider of SSL certificates and digital signatures in the Netherlands. With the two acquisitions, Sectigo significantly extends its sales reach and support for the company's leading SSL certificate solutions, Sectigo Web Security Platform and Sectigo Certificate Manager platform, to thousands of additional organizations across Europe and Latin America. Accelerate growth The acquisitions accelerate Sectigo's growth trajectory globally following the company’s recent recapitalization by GI Partners, a leading private investment firm. “Acquiring SSL247 and Xolphin is an early milestone in Sectigo’s next chapter of growth, expanding our reach across Europe and Latin America,” said Bill Holtz, CEO, Sectigo. “Sectigo has partnered with SSL247 and Xolphin for many years. Both organizations are known for rapid and reliable SSL certificate delivery and world-class expertise and support. We proudly welcome them to Sectigo.” About SSL247 A long-time Sectigo channel partner, SSL247 has nearly two decades of experience selling and supporting SSL certificates, vulnerability assessments, digital IDs (email, code signing, IoT certificates), penetration tests and audits, data protection, and other security solutions to customers across 18 countries in Europe and Latin America. As digital security experts, SSL247 is driven to help secure the value of businesses online and offline, through a range of specifically tailored services. Joining the global Sectigo organization will enable our team to offer a broader set of resources and solutions to our more than 10,000 satisfied clients, spanning micro businesses to large enterprises, said Benjamin Tack, Commercial Director at SSL247. About Xolphin Recognised with a five-star rating for its customer support and rapid EV certificate validation Founded in 2002, Xolphin has issued more than a million certificates to more than 50,000 customers in Europe. Recognised with a five-star rating for its customer support and rapid Extended Validation (EV) certificate validation, the company has an active network of global resellers who rely on Xolphin’s expertise to quickly provide SSL certificates and digital signatures products for email, code signing, and PDF signing. Strengthen and expand digital identity “We have enjoyed a successful partnership with Sectigo for nearly 20 years, allowing us to grow rapidly and establish a highly qualified validation department as a Registration Authority for Sectigo certificates.” “By combining our expertise and resources with Sectigo’s industry leadership, we are well-positioned to strengthen and expand our digital identity and web security offerings,” explained Maarten Bremer, CTO, and Owner, Xolphin. Additional acquisitions With the additions of SSL247 and Xolphin, which will maintain their brands as Sectigo subsidiaries, Sectigo has made four acquisitions over the past three years. In 2019, Sectigo acquired Icon Labs, a security solutions provider for embedded OEMs and IoT device manufacturers, and in 2018 the company acquired Codeguard, Inc., a global front-runner in website maintenance, backup, and disaster recovery.
Icon Labs, a provider of security solutions for IoT and edge devices, announces the availability of its new white paper: “Why PKI Matters for the IIoT.” Explaining PKI This new IoT security white paper explains PKI, Authentication, and Certificate Management – how they work, what they are, and how OEMs, manufacturers, and developers can implement the latest technical developments in PKI security technologies. “OEMs building IIoT devices, and enterprises deploying IIoT networks must be proactive by ensuring the proper security capabilities are built into both the devices and the networks in which they operate,” says Alan Grau, President of Icon Labs. “Strong authentication of all devices within an IIoT network is a critical requirement for securing these networks.” Enhancing cybersecurity Cyber-attacks against industrial control systems, water treatment plants, critical infrastructure, and other IIoT networks are on the rise as is the number of devices that hackers can target. As the number of devices grows, so does the range of opportunities to hack those devices, and subsequently alter the data. The bottom line is we now have a growing number of both targets and attacks, so we must put the cyber-security solution in place to protect these devices. Just as cyber-attacks take many forms and exploit a wide range of vulnerabilities in the target device, so too is cybersecurity multi-faceted. A fundamental, but often ignored, aspect of cybersecurity for IIoT devices is strong authentication.
Icon Labs products provide embedded security for IoT and Machine-to-Machine solutions Icon Labs, a provider of security solutions for IoT and edge devices, announced Icon Labs President Alan Grau has been selected to present at Embedded World Show Europe. Alan’s presentation will provide engineers, product managers, and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secure IoT devices. Security management Engineers developing IoT devices have a wide range of choices for adding security to their device. Hardware security elements including TPMs, TEEs and secure elements are available from a variety of vendors. Software security solutions are also available that can provide a variety of features include secure communication, authentication, firewalls, secure boot, secure firmware updates, and security management. The presentation will discuss some recent hacks, cyber security trends, and a detailed overview of IoT security technologies and how they can be applied to secure IoT devices. Specific attention will be paid to the trade-offs and interactions between hardware and software security implementations. Key topics Topics covered include: Hardware security: Description of TPMs, TEEs, TrustZone and other HW security elements and how they are used in IoT devices Software security: Firewalls, encryption, security protocols and secure boot Hardware vs. Software: The role of HW security vs. The role of SW security What security features does your IoT device require? What are the minimum requirements? Scalability issues: How to address security for sensors, endpoints, and gateways System level view of security Embedded securityIcon Labs’ products provide embedded security for IoT and Machine-to-Machine (M2M) solutions in aerospace, industrial, medical control devices, and consumer electronics. The Floodgate Security Framework provides a ‘defense in depth’ solution to protect control units and endpoint devices from cyber threats, aid in compliance with regulatory mandates and guidelines, and gather and report command, event, and device status information for audit requirements.
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download