IoT Security: Understanding Platform Features
by Exosite, on August 11, 2016
There are many pieces to developing successful connected product deployments and with so many moving parts it can be difficult to decide where to start. Companies often jump into the Internet of Things pool with a proven and tested connected product that lacks one major feature, IoT security. As a leading consumer and industrial IoT platform provider, Exosite is invested in ensuring the security of its clients.
The Exosite platform has a number of cutting-edge IoT security features that act as building blocks to protect data at rest, in motion, and in use, including:
- Secure Transmissions: API end-points are all available via SSL/TLS or Datagram Transport Layer Security (DTLS)
- Secure Storage: Physical access to data stored on Exosite servers is restricted in several ways
- Device Authentication: Device identities are protected via temporal API keys that Exosite calls Client Interface Keys (CIKs)
- User Access and Authentication: Users are authenticated in several ways and access can be tailored to any application
- Manufacturing Integration: Exosite provisioning systems allows OEMs to manage full connected product fleets from manufacturing through usage and retirement
- Time-Boxed Provisioning Windows: Once in the field, a multi-factor provisioning method occurs
For a full description of Exosite’s security offerings, download the full white paper below or contact us directly to ensure your IoT security today.