Select

Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology

Technology Overview

The Internet of Things (IoT) connects numerous everyday devices, opening up previously closed systems to remote access & control. Smart, connected devices are now an integral part of our lives, in business and at home.

Be it Smart Cities with sensors and digital management systems for energy, utilities, transportation etc. Or smart homes and offices with a host of connected smart devices, connected cars, Unmanned Aerial Vehicles (UAVs) or even industrial control systems. 

However, the rapidly growing world of perpetually-connected smart devices presents proportionally large security risks. Existing security solutions are unable to keep pace, scale-up and address the security challenges facing the emerging IoT world. 

The company was accelerated by Airbus via its BizLab program and has built a next-gen cybersecurity solution designed explicitly for connected devices and critical infrastructure in the Internet of Things. The solution harnesses Software Defined Perimeter (SDP) architecture to render critical infrastructure invisible to attackers; while customized agents along with Blockchain and TLS technology delivers a new breed of digital identity and access control for all users and connected devices. 

Technology Features & Specifications

The solution delivers an enhanced Software-Defined Perimeter using private-permissioned Blockchain and Transport Layer Security (TLS) technology. 

Software Defined Perimeter architecture renders critical infrastructure invisible to attackers; while customized agents along with Blockchain and TLS technology delivers a new breed of digital identity and access control for all users and connected devices. It leverages digital signature based identity and authentication for humans, machines and data; securing connected devices and tightly ring-fencing critical IoT infrastructure. 

The solution also utilizes Blockchain-based digital signatures to secure communication channels. Its Zero Trust setup allows for micro-segmentation of connected devices as well as all associated users.

The decentralized architecture ensures there's no single point of failure while providing a robust, scalable and highly-resilient system for large scale distributed IoT networks.

Potential Applications

The solution can be used to secure all forms of connected devices, IoT gateways and central systems that the devices connect into.

From smaller personal wearable and mobility devices to larger autonomous transportation infrastructure, medical devices and beyond, the solution can be used to secure various devices and critical systems.

The solution can also be deployed within the Industrial IoT space across sensors, robotics, Supervisory Control and Data Acquisition (SCADA) systems and more.

The solution can also be extended to provide identification/access and secure critical systems and infrastructure within Smart City programs.

Market Trends and Opportunities

The rapidly growing world of perpetually-connected smart devices presents proportionally large security risks. Existing security solutions are unable to keep pace, scale-up and address the security challenges facing the emerging IoT world. 

Meanwhile, emerging technology offers opportunities to secure connected IoT devices and smart infrastructure in bold new ways. The solution delivers a next-gen military-grade security system to protect connected devices and critical infrastructure against cyber threats. 

Customer Benefits

A next-gen military-grade security system to protect connected devices and critical infrastructure against cyber threats. This includes:

  • Cryptographically-secure digital identity for users, connected devices and central servers/ services
  • Invisible & locked down critical systems with micro-segmentation and fine-grain access control
  • Best-in-class military-grade encryption for secured access to connected devices and IoT communication
  • Immutable & tamper-proof logs stored securely on the Blockchain for instant access / analysis

A next-gen system with a decentralized architecture to ensure there's no single point of failure while providing a robust, scalable and highly-resilient system for large scale distributed IoT networks.

Make an Enquiry