Cloud-based SaaS solution tightens IoT security
There will be 75 billion connected devices by 2025 and right now 48% of companies have reported an IoT security breach at least once.
“The costs of such a breach can exceed 10% of revenues,” says Larry O’Connell (pictured), Vice President of Marketing for Sequitur Labs.
Why is this happening? “It’s a lack of specialised skills and time to market pressure,” answers O’Connell.
Which is where Sequitur Labs comes in.
Bolstering its position in the IoT security market the company has released EmPOWER, a new cloud-based offering that monitors, manages and updates IoT devices to address technical, IP, supply chain and business-process challenges faced by IoT developers and manufacturers dealing with the acceleration of Artificial Intelligence at the network edge.
It joins Sequitur’s EmSPARK which consists of firmware, tools and APIs for microprocessor security.
The two products establish what O’Connell describes as “the Sequitur security platform.”
“It enables a 40 % reduction in time to market and a fraction of in-house development costs and risk,” he adds.
Securing IoT requires specialised knowledge of a wide array of architectural components spanning hardware, operating systems and software, as well as a deep understanding of secure lifecycle processes.
Sequitur’s considerable expertise and knowledge in securing embedded systems from the ground up enables it to help customers overcome risks associated with unsecured designs, supply chain compromises and vulnerable lifecycle management processes.
EmPOWER provides customers with “Trust as a Service” that has the ability to monitor, manage and update IoT devices. This significantly reduces risk and ensures that products are protected from attacks throughout the manufacturing process and life of the product.
Together with its EmSPARK Security Suite, Sequitur is able to provide a complete IoT security solution from chip-to-cloud.
IoT device developers need to ensure their products are protected from attacks, safe and secure, and able to be managed securely throughout the life of the product. At the forefront of this critical approach is the protection of ML/AI models at the edge.
EmPOWER enables this protection for devices in industries where security is paramount, such as industrial control, building automation, the smart home, machine vision, automotive communication, and medical devices.
By providing threat detection, remediation and device metrics of products in the field and at the edge, companies can be assured that their business-critical IP is protected against outside threats.
Built on three pillars of product security – design, build and sustain – EmSPARK uses the Arm TrustZone architecture extension to create a safe-and-secure environment for critical device data and applications. Supporting security functions for encryption, storage, data transmission and key/certificate management are delivered by EmSPARK and housed in the secure environment.
IoT hardware manufacturers use EmSPARK to easily implement device-level security by addressing all the technical, IP, supply chain and business process challenges. Developers can easily build applications that use secure resources without having to become experts in cryptography and complex hardware security technologies.