Menu

IoT FEATURE NEWS

How to Make IoT Security Simpler

By

Everyone understands that security is critical to the growth of the IoT, and the current solutions fall broadly into one of two camps: retrofit or build it in. Although retrofitting is a necessary compromise in some cases, the ideal case is that all new solutions will come with embedded security measures like signal encryption and hardened edge devices. Enterprises and developers are calling for this change, and now, some vendors are looking to take the work out those decisions for OEMs by building it in at the component level.

“As more financial and personal interactions are done via mobile devices, security becomes even more important,” said Ken Wimberley, VP Product Manager from JP Morgan Chase. “Service providers and apps developers are looking for easier and more comprehensive ways of securing users’ data across all devices in a consistent way.”

Trustonic, a provider of hardware-enabled security for smart devices, has announced Trustonic Hybrid Protection (THP), which helps app developers to integrate advanced security capabilities onto devices. THP makes it easier for developers to design in security from the start, and to deploy these enhanced services on mobile and IoT devices. THP is designed to combine Trustonic’s hardware-enabled security solutions with software protection technologies licensed from whiteCryption.

“Trustonic has been a key driver in the evolution of security in the mobile market and more recently the emerging IoT space,” said Ben Cade, CEO, Trustonic. “Trustonic Hybrid Protection makes it simpler for apps developers to improve app security whilst being able to scale across a wide range of mobile and IoT devices.”

Taking another tack, Icon Labs, an embedded networking and security technology developer, has released its Floodgate Modbus Protocol Filtering (FMPF) product to add critical protection capabilities for Industrial IoT and RTOS-based devices to its existing security products. 

The FMPF provides what Icon says is a critical missing layer of security for Modbus/TCP devices by using deep packet inspection to enforce virtual network segmentation and to control packets processed based upon source network address, function code, and packet data contents.

“The Modbus/TCP protocol currently lacks any real security, making these devices sitting ducks for even moderately skilled hackers,” said Alan Grau, President, Icon Labs. “Several attempts to add security to Modbus/TCP have been proposed, but none provide a cost-effective solution for legacy devices while maintaining interoperability with the protocol standard.  Modbus packet filtering addresses this problem by enforcing policies and inserting a layer of control without changing the underlying protocol.”




Edited by Kyle Piscioniere
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

Rising Edge Computing Investments to Reach $350B by 2027, According to IDC

By: Alex Passett    3/27/2024

Worldwide spending on edge computing is expected to surge (and then keep going) for the foreseeable future, according to the International Data Corpor…

Read More

ZEDEDA Adds Lisa Edwards as New Board Member, Seeks Opportunities to Strengthen Operations and Scale

By: Alex Passett    3/26/2024

Earlier this morning, ZEDEDA announced the addition of Lisa Edwards to its board of directors.

Read More

An Existing IoT Collab, Emboldened: Digi International and Telit Cinterion Transform Solutions with 5G RedCap Integration

By: Alex Passett    3/25/2024

The ongoing industry collaboration between Digi International and Telit Cinterion signals strong support for the mainstream showcasing of 5G for IoT a…

Read More

Telit Cinterion's 5G LGA Modules, Powered by Snapdragon from Qualcomm, to Create a Big Leap in IoT Connectivity

By: Alex Passett    3/25/2024

Telit Cinterion recently unveiled its FE990B34/40 LGA family of modules, powered by the Snapdragon X72 5G Modem-RF System from Qualcomm Technologies, …

Read More

Embracing Innovation in Mining: The Role of Network-Aware Applications in the Digital Transformation

By: Special Guest    3/21/2024

Shabodi leverages private 5G network capabilities and enables the development of network-aware applications to enhance operational efficiency, automat…

Read More