Device Security


Device and User Authentication


Granular Authorization


Network Threat Monitoring


Financial Grade Data Security


IoT Security Audit and Compliance


Some Highlights


Device Security

Secure Boot

Secure Upgrade

Secure Onboarding

Secure remote access

Security event blogging

Virtualization and sandboxing

Device and User Authentication

Sync users from LDAP and Active Directory servers

X.509 certificate based authentication for IoT devices

Device Authentication for Constrained IoT devices

Identity brokering

APIs for Applications & Endpoint Devices

Detailed Access Logs and Audit reports

Granular Authorization

Granular Access and Authorization for application/devices and users

OAuth ACE support for constrained IoT devices/applications

APIs for Applications & Endpoint Devices

Over the Air Update Support

Network Threat Monitoring

Agent based network scanning: gateways, end devices

Curated learning threat assessment

Rule based threat assessment

Alert based threat assessment

Trend based threat assessment

Financial Grade Data Security

Secure storage and Lockers

Iot Data organized in secure lockers

Privacy, Authenticity, Confidentiality and Integrity of IoT Data

IoT Security Audit and Compliance

Threat modelling & classification

Equipment reverse engineering

Code audits

Penetration testing

Data Privacy Assessment

Issue resolution

Regulatory compliance