Menu

IoT FEATURE NEWS

Covisint Aims to be the Go-To Source for IoT Identity-Centric Security

By Paula Bernier August 19, 2015

This summer a report that two hackers were able to remotely wrest control of a Jeep Cherokee from its driver captured headlines and raised alarms about the lack of security relative to the Internet of Things. Last night at IoT Evolution Expo, John Gleeson explained how Covisint can better secure the IoT by acting as a central authority for access to such devices and solutions.

Covisint has been around for well more than a decade, and was formed by a consortium involving Chrysler, Ford, GM, Nissan, Peugeot and Renault. Today the company serves customers from not just the automotive space, but also from various other verticals including oil and gas, and travel—and it has more than 3,000 global customers.

The company, Gleeson said, wants to become the platform of choice for IoT and identity-centric solutions.

Image via Shutterstock

Its solution ensures security by making sure only those with authority to access certain endpoints and other IoT resources are able to get it. That’s important considering the growing ecosystem of players involved in things like connected cars. For example, in the case of a car, that ecosystem could include the vehicle brand, the dealers, maintenance organizations, parts suppliers, etc. Covisint, he added, also limits information exposure in these interactions, so the requesting party only has access to the specific resource that relates to their involvement.

Gleeson also talked about how a motorist that has owned a car for a while has probably gotten the car’s settings related to the seat position, climate control, the sound system, and the like, to how he or she wants them. So when it’s time to get a new car, he said, the motorist can now take those setting with him or her. This discussion had to do not just with securing a car, but adding to its value proposition, and Gleeson seemed to indicate this kind of thing could allow for more product stickiness.




Edited by Dominick Sorrentino

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

Deloitte Selects Miami Based Unified Technologies for Caribbean Cyber Security Alliance

By: Ken Briodagh    8/16/2017

Unified Technologies, an IT solutions provider with operations in the Caribbean and North America, has announced a newly established Cyber Security Al…

Read More

InfoSec Veteran Mike Ahmadi to join DigiCert as Global Director of IoT Security

By: Ken Briodagh    8/16/2017

Ahmadi brings decades of leadership and advocacy in critical infrastructure security, including active participation in several standards creation gro…

Read More

IoT Time Podcast S.2 Ep.43 Nokia

By: Ken Briodagh    8/16/2017

On this episode of the IoT Time Podcast, Ken Briodagh sits down with Khamis Abulgubein, PLM, Emerging IoT Applications at Nokia.

Read More

To Build or To Buy: That is the Question

By: Ken Briodagh    8/15/2017

When a company seeks to implement an IoT solution, the decision of whether or not to build a custom tool or platform is no less dire. It can mean the …

Read More

Speed is King in Florida as Verizon, Ericsson and Qualcomm Approach 1G Wireless

By: Arti Loftus    8/15/2017

As we move closer to a 5G world, a new age of intelligent, connected devices is paving the way towards more reliable and faster performance.

Read More