MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
  • 4G
  • 5G
  • Broadcast
  • Education
  • Mobile
  • streaming
  • Software
Facebook Twitter Instagram
Facebook Twitter Instagram
MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
  • 4G

    GL.iNet Beryl AX OpenWrt router review – WiFi 6 performance, repeater, NAS, and 4G hotspot modes

    January 29, 2023

    Unlock The Benefits Of Xfinity Mobile Al – abtamag

    January 29, 2023

    Zp To Provide Land For Bsnl Cell Towers In Rural Nashik | Nashik News

    January 29, 2023

    Oppo Reno8 T 4G Sunset Orange model poses for the camera, revealing key specs

    January 28, 2023

    Saginaw Hosts Sarnia on 15th Annual Shocks and Saves Night

    January 28, 2023
  • 5G

    Samsung Galaxy A14 5G vs. Galaxy A13 5G: Worth the upgrade?

    January 29, 2023

    Only 20% of Taiwan using 5G mobile internet | Taiwan News

    January 29, 2023

    New 5G pilot at Orange Jordan’s Innovation Hub

    January 29, 2023

    The uber-cool Razer Edge 5G hits Verizon’s store shelves

    January 28, 2023

    SaskTel to roll out 5G network in Battlefords area

    January 28, 2023
  • Broadcast

    Journalists back Kan against budget cuts, say public broadcasting not up for debate

    January 29, 2023

    Who is broadcasting Super Bowl 2023? A guide to the TV channel, announcers & more on Super Bowl 57 rights

    January 29, 2023

    How to listen to the NFC Championship Game

    January 29, 2023

    🌍 #1492 January 28, 2023 Broadcast

    January 28, 2023

    Wisconsin vs. Illinois: Stream, injury report, broadcast info for Saturday – Badgers Wire

    January 28, 2023
  • Education

    How technology will transform global education in 2023

    January 27, 2023

    MassBay Community College Offering Free Computer & Technology Education and Training to Unemployed and Underemployed Workers

    January 27, 2023

    Need to focus on reshaping technology education, says CM Naveen Patnaik

    January 26, 2023

    Tech ed students make cornhole sets for Winter Regatta – WJFW-TV

    January 26, 2023

    Ontario updating curriculum for computer, technological education

    January 24, 2023
  • Mobile

    Getting ready for your 2023 tax filing

    January 29, 2023

    Copper Wire’s Long Goodbye – UC Today

    January 29, 2023

    Security, democracy wane in Africa

    January 29, 2023

    Minneapolis Portfolio Management Group LLC Cuts Position in Sony Group Co. (NYSE:SONY)

    January 28, 2023

    Spok Holdings, Inc. is purchased by Allspring Global Investments Holdings LLC for 13,700 shares (NASDAQ:SPOK)

    January 28, 2023
  • streaming

    FuboTV Turned 8 Years Old In January

    January 29, 2023

    Brighton vs Liverpool:Live stream, TV channel, kick-off time & where to watch

    January 29, 2023

    Is the Split-Season Method the Future for Netflix?

    January 29, 2023

    FuboTV Will Reportedly Lose Some CBS Locals on Monday

    January 28, 2023

    How to Get Disney+, Paramount+, Netflix, Hulu, & More Free From Services You Already Pay For

    January 28, 2023
  • Software

    Save $93 on This Mini AI Robotics Arm and Software

    January 29, 2023

    Turkish firm to develop ‘critical’ NATO intelligence software

    January 29, 2023

    Raymond James & Associates buys 6,075 Coupa Software Incorporated shares (NASDAQ:COUP)

    January 29, 2023

    2023.2.10 Official Tesla Release Notes

    January 28, 2023

    LEA Professional Releases Sharkware Software, Works With Professional Connect Series Amplifiers – rAVe [PUBS]

    January 28, 2023
MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
Home»Software»Device Authority and Trusted Objects announce end-to-end software security solution for all Edge IoT devices
Software

Device Authority and Trusted Objects announce end-to-end software security solution for all Edge IoT devices

By mulegeek-January 18, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

SAN RAMON, Calif. and LONDON, Jan. 18, 2022 /PRNewswire-PRWeb/ — Device Authority, a global leader in identity and access management (IAM) for the Internet of Things (IoT), and Trusted Objects, a leading player in cybersecurity technologies for embedded systems and cloud device management platforms, today announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform. Last year Trusted Objects joined the KeyScaler Ready program which enabled both teams to work closely together to provide a combined solution for IoT Edge devices.

IoT security solutions must be adapted to manage connected device constraints, including limited computing capabilities, lower cost, power consumption and scalability. Trusted Objects’ TO-protect RoT is based on state-of-the-art technologies to protect IoT devices, including innovative embedded secure libraries for generic microcontrollers. TO-protect offers a lower cost alternative to a Secure Element or TPM, enabling:

  • Easy to integrate on-device software RoT
  • Prevention against logical and physical security attacks on IoT devices exposed to threats
  • Pre-validated SDKs to work alongside various chipset families
  • Fully integrated in several IoT chains to achieve a Chain of Trust
  • Compatible with existing hardware (no redesign / no impact on the BOM),
  • Easy security retrofit for devices already in the field with MCU FOTA (Firmware-Over-The-Air).

Integrating TO-protect with KeyScaler enables full end to end Security Life Cycle management from Edge to Enterprise into any IoT Cloud application e.g. Microsoft Azure, Avnet IoTConnect, AWS, Ericsson, PTC ThingWorx, Google. Utilizing a software RoT in IoT deployments meets the needs for robust device security, at the same time providing scalability to meet the needs of new and legacy device deployments. This software model works incredibly well for distributors such as Avnet, who can provide device software “SKUs” for OEMs and enable Security Lifecycle Management into the Avnet IoTConnect platform, and at the same time saving the customer BOM cost and potential redesigns.

“The integration of TO-protect to KeyScaler showcases how easy it can be to build Edge to Enterprise solutions with KeyScaler, to meet the needs of our customers and channel partners. The Trusted Objects solution offers a disruptive alternative to TPMs and SE where cost and redesign are prohibitive. It’s great to see our teams collaborate to bring this software root-of-trust based solution to market” said Darron Antill, CEO of Device Authority.

Sami Anbouba, CEO of Trusted Objects, states: “This partnership is another milestone on our journey in securing the IoT. We have demonstrated that our technologies enable Identity and Access Management for constrained IoT devices securely and at scale.
The integration of our TO-protect software RoT to KeyScaler was very straightforward and we are confident that it will run the same way with our customers.”

“Our customers and suppliers are demanding software alternatives to Secure Elements and Trusted Platform Modules. Having Software and Hardware options enables us to serve our OEMs to meet the needs of their Go-To-Markets. Connecting TO-protect to KeyScaler, and KeyScaler to our IoTConnect platform brings Security Lifecycle Management and Automation to our customers, to solve their Identity and Key management challenges that they face every day. This software alternative to secure hardware combined with the secure programming capabilities offered by Avnet Programming Centers make it a viable solution to solve the logistics issue faced by our customers when deploying their products.” said Lou Lutostanski, VP Internet Of Things, Avnet.

Learn more about the partnership and technology during a webcast session with Trusted Objects at our Virtual IoT Security Summit here: https://www.deviceauthority.com/webinars/

About Trusted Objects
Trusted Objects is a leading independent player in cybersecurity technologies for embedded systems and cloud device management platforms. Trusted Objects provides innovative solutions including secure software and secure operations to dramatically enhance the whole security chain, from edge device to cloud platform. Thanks to its longstanding expertise, Trusted Objects designs products and solutions that change the game, with a focus on ease of integration and user-friendliness, while complying with the latest standards in terms of security.

Trusted Objects to-security products and services for constrained devices, are positioned to create trust all along the value chain and to cover edge devices, network, cloud and manufacturing.

More information at http://www.trusted-objects.com

About Device Authority
Device Authority is a global leader in identity and access management (IAM) for the Internet of Things (IoT) and focuses on medical/healthcare, industrial, automotive, and smart connected devices. Our KeyScaler platform provides trust for IoT devices and the IoT ecosystem to address the challenges of securing the Internet of Things. KeyScaler uses breakthrough technology, including Dynamic Device Key Generation (DDKG) and PKI Signature+ that delivers simplicity and trust to IoT devices. This solution delivers automated device provisioning, authentication, credential management, policy-based end-to-end data security/encryption and secure updates.

With offices in San Ramon, California, and Reading, UK, Device Authority partners with the leading IoT ecosystem providers, including AWS, Ericsson, Entrust, HID Global, Microsoft, PTC, Thales, Venafi, Wipro and more. Keep updated by visiting http://www.deviceauthority.com, following @DeviceAuthority and subscribing to our BrightTALK channel.

Media Contact

Hervé ROCHE, VP Marketing, Trusted Objects, +33 4 42 39 86 30, contact@trusted-objects.com

 

SOURCE Trusted Objects

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
mulegeek-
  • Website

Related Posts

Save $93 on This Mini AI Robotics Arm and Software

January 29, 2023

Turkish firm to develop ‘critical’ NATO intelligence software

January 29, 2023

Raymond James & Associates buys 6,075 Coupa Software Incorporated shares (NASDAQ:COUP)

January 29, 2023

Leave A Reply Cancel Reply

Categories
  • 4G
  • 5G
  • Broadcast
  • Education
  • Mobile
  • Software
  • streaming

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Save $93 on This Mini AI Robotics Arm and Software

January 29, 2023

GL.iNet Beryl AX OpenWrt router review – WiFi 6 performance, repeater, NAS, and 4G hotspot modes

January 29, 2023

Samsung Galaxy A14 5G vs. Galaxy A13 5G: Worth the upgrade?

January 29, 2023

Journalists back Kan against budget cuts, say public broadcasting not up for debate

January 29, 2023
Facebook Twitter Instagram Pinterest
  • About Us
  • Cookies policy
  • Terms of services
  • Contact us
  • DIsclaimer
© 2023Designed by mulegeek.

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT