Automated Security Platform for IoT Devices

Automated Security Platform for IoT Devices

data
A 96th Security Forces Squadron uses the android tactical assault kit to send a message from his patrol vehicle July 5 at Eglin Air Force Base, Fla. The ATAK is a new communication system implemented at Eglin that so far has provided significant improvements in the base’s defense mission. The tablet-based system provides written communication, pictures, mapping, GPS and data access to defenders more quickly than previous methods which relied heavily on radio transmissions. (U.S. Air Force photo/Samuel King Jr.)

This post is also available in: heעברית (Hebrew)

The Internet of Things (IoT) – the connected devices realm – has become a part of everyday life in any sector. However, with this growth comes increasing IoT security concerns. To enable organizations and businesses to make decisions based on data and insight, they need to be able to trust IoT devices and the data being gathered,  having the right level of security designed into their devices. 

A new security platform that “enables IoT devices to defend themselves against hackers without the need for human intervention” has been launched. The platform based on ARM  chips is designed to provide security, privacy protection and data integrity for IoT devices. It is aimed at brand manufacturers seeking to deliver security, data integrity and privacy protection in IoT devices.

ARM is a family of reduced instruction set computing (RISC) architectures for computer processors.

The developer, NXM Autonomous Security, is certified by the Platform Security Architecture (PSA) organization, which provides security evaluation for chip vendors, OS providers and IoT device makers. 

“NXM automates security processes to eliminate human error, a leading cause of cybersecurity breaches,” the announcement states, according to adtmag.com. “…In the rare event that a device’s security is ever compromised, the system can reset a device’s encryption keys allowing the device to resume normal operation with restored security. This same technology platform will be capable of protecting devices against rapidly evolving cyber threats from future quantum computers.”