Menu

IoT FEATURE NEWS

Icon Labs Builds IoT Security Guide for IoT Devices and Systems

By

Icon Labs, a provider of IoT security solutions, has released a whitepaper for IoT device engineers and manufacturers that divides the hardware of the IoT into discrete circles of Security. Click here to download it.

“Determining the details of security capabilities and features to be implemented for a given device depends upon the available memory, processing power of the core(s), interfaces, attack vectors, threat analysis, and ultimately, business trade-offs,” said Alan Grau, President and Co-Founder, Icon Labs. “Companies need to have a consistent approach to security no matter the class of device. Using this framework allows a view of security that is rational and easily implemented.”

Icon Labs worked with numerous customers, industry experts and analysts to develop guidelines to make decisions about IoT security design a little simpler. These guidelines divide all IoT scenarios according to power requirements, from Bluetooth LE all the way up to high end gateways. The four classes of devices in this whitepaper range from small, Class 1 (8 and 16 bit MCUs)  devices that have very little room for additional security protocols to complex Class 4 devices running on embedded Linux, Android, or a full-featured RTOS supporting multiple networking protocols.

“Providing adequate security for Internet connected devices is extremely important,” says Steve Hoffenberg, director and industry analyst with VDC Research. “Many organizations deciding to build new connected devices can benefit from insights provided by experienced industry participants to improve upon the security capabilities of their existing products and technologies.”




Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

I've Asked the Security Experts, But It's Time You Have Your Say

By: Carl Ford    6/27/2025

Security experts are quick to say they know what's happening, but here's your opportunity to weigh in on the state of cybersecurity in IoT.

Read More

Mary Meeker Returns with AI and Breezes Past AIoT

By: Carl Ford    6/26/2025

We are entering an era where intelligence is not just embedded in digital applications, but also in vehicles, machines, and defense systems

Read More

Nothreat Fights AI Fire with AI in Firewalls

By: Carl Ford    6/26/2025

According to Nothreat, the only way to fight AI cyber threats in IoT with AI is to go beyond detection and into active containment, deception, and aut…

Read More

How Kapitus is Reshaping SMB Funding

By: Carl Ford    6/16/2025

Kapitus is a financial institution that provides various financing solutions to SMBs, operating as both a direct lender and a financing marketplace.

Read More

Slicing Up the Network with 5G SA: An Interview with Telit Cinterion's Stan Gray

By: Carl Ford    6/10/2025

Carl Ford speaks with Stan Gray about 5G SA, network slicing, and trends, challenges, and opportunities related to both.

Read More