Sign Up        Log In

Industry Solutions

Exosite's ExoSense®️ Condition Monitoring Application and Murano IoT Platform enable organizations to deliver services and solutions for industries with high value assets, equipment, sensors, and machines.  

Customers

Learn how other Organizations have leveraged Exosite.

icon-exosite-exosense-app
ExoSense Condition Monitoring
icon-exosite-cloud
icon-exosite-cloud-platform
icon-exosite-onprem-platform

Exosite Blog

News, Articles, Thoughts, Product Information

< Exosite Blog

IoT Security: Understanding Platform Features

by Exosite, on August 11, 2016

There are many pieces to developing successful connected product deployments and with so many moving parts it can be difficult to decide where to start. Companies often jump into the Internet of Things pool with a proven and tested connected product that lacks one major feature, IoT security. As a leading consumer and industrial IoT platform provider, Exosite is invested in ensuring the security of its clients.

The Exosite platform has a number of cutting-edge IoT security features that act as building blocks to protect data at rest, in motion, and in use, including:

  • Secure Transmissions: API end-points are all available via SSL/TLS or Datagram Transport Layer Security (DTLS)
  • Secure Storage: Physical access to data stored on Exosite servers is restricted in several ways
  • Device Authentication: Device identities are protected via temporal API keys that Exosite calls Client Interface Keys (CIKs)
  • User Access and Authentication: Users are authenticated in several ways and access can be tailored to any application
  • Manufacturing Integration: Exosite provisioning systems allows OEMs to manage full connected product fleets from manufacturing through usage and retirement
  • Time-Boxed Provisioning Windows: Once in the field, a multi-factor provisioning method occurs

For a full description of Exosite’s security offerings, download the full white paper below or contact us directly to ensure your IoT security today.
download IoT security white paper


Topics:IoT Strategy

Subscribe to Updates