About Us

Trusted Objects launches IoT Device Protector

A leading expert in cybersecurity technologies for embedded systems and cloud device management platforms, Trusted Objects Launches a New IoT Device Protector to-protect an industry-unique software-protected feature.

The new IoT device protector to-protect is a simplified technology platform that enhances the security of IoT devices using generic microcontrollers (MCU). It makes establishing a trust chain in the IoT ecosystem easier and can be used as a Root of Trust (RoT) to provide security services throughout the device life cycle.

The Chief Security Architect at Trusted Objects, Vincent Dupaquis stated “With this new release of to-protect, the IoT ecosystem is taking a major step toward more embedded security and a wider range of security services at the device level. It is a smart technology to simply and rapidly integrate security into new and existing IoT applications.”

As the adoption of IoT increases, the approach grows at a tipping point where security becomes a top consideration for both developers and users. There is a rising expectation that IoT devices would be protected from security assaults and that the security services provided by IoT devices will include a Root of Trust (RoT).

The 2.0 new release provides further security countermeasure capabilities against the most advanced logical and physical threats, including side-channel threats and fault injection, for both new and existing applications. A Level 3 certification for the Security Evaluation Standard for IoT Platforms (SESIP) is in the works.

Benefits of to-protect for IoT device developers:
  • Quick download into any generic MCU (ARM Cortex, RISC V) without changing the IoT hardware platform design
  • Easy security integration into devices that are already in use (retrofit).

Trusted Objects launches IoT Device Protector to-protect that has already been ported to a variety of platforms, including STMicroelectronics’ STM32 and Espressif’s ESP32 series, proving the solution’s ease of integration and security benefits.

Viakoo Launched Device Certificate Manager

To help enterprises expand Zero Trust to IoT Networks, Viakoo, the leader in IoT vulnerability remediation, launched Device Certificate Manager (DCM) as an addition to the Viakoo Action Platform. DCM can use 802.1x certificates to authenticate devices and TLS certificates to encrypt traffic. Automating the IoT certificate process ensures that approved IoT devices maintain consistent and secure network connectivity.

Organizations can achieve Zero Trust for their IoT infrastructure at scale with Viakoo DCM automation while improving efficiency. All software modifications, zero-trust certificate provisioning and administration, and password enforcement are managed by the Viakoo Action Platform, an automated, agentless, and scalable solution for enterprise IoT device rehabilitation and repatriation. It not only fixes IoT device vulnerabilities but also allows them to reconnect to the corporate network in a secure manner.

The CEO, and Founder of Viakoo, Bud Broomhead stated, “As more and more organizations leverage the power of IoT devices, the IoT attack surface simultaneously expands. Deploying certificates manually device by device across geographies and vendor systems is not efficient or secure. We’re at a point where it’s essential to automate IoT security processes to contend with the scale of these environments.”

In today’s rapidly developing IoT settings the process of installing and maintaining certificates for multiple IoT devices from several suppliers across countries is not feasible. Enumerable organizations protect their networks by manually verifying that every device connected to the network has valid 802.1x and TLS certificates. At nearly any scale, the Viakoo Action Platform with DCM provides centralized, automated, full life cycle management for 802.1x and TLS certificates.

Entrust and Device Authority Collaborate to Provide Services for IoT

Entrust and Device Authority collaborate to help organizations overcome the logistical constraints of large-scale IoT deployment by enabling automated Public Key Infrastructure (PKI) certificate administration.

Entrust is a prominent provider of trusted identities, payments, and data security solutions, whereas Device Authority is a global leader in identity and access management.

The two entities are regarded as industry leaders in IoT Device Identity Lifecycle Management. They have also combined Device Authority’s KeyScaler IoT IAM platform with Entrust’s PKI services. Extending their collaboration for Hardware Security Module services to enable device trust, data trust, and automation at the IoT scale. Connecting to FIPs compliant Entrust PKI and HSM services will enable security activities. Device attestation, onboarding, Machine Identity Lifecycle Management, certificate signing, and cryptographic operations are some of the security activities. KeyScaler’s pre-built service connectors or configurable connection framework, can also automate security operations in any cloud application or platform.

CEO of Device Authority, Darron Antill stated, “Without the proper management of machine identities, organizations can’t guarantee the confidentiality of information that flows to authorized machines or prevent the flow of information to unauthorized machines. Not only does our partnership with Entrust enable the automated management of security throughout a device’s lifecycle but it also increases efficiencies and reduces overheads, allowing for brownfield deployment and integration into any IoT application or platform.”

The Vice President, Certificate Solutions Products and Markets at Entrust, Jay Schiavo commented, “By expanding our partnership with Device Authority, we can provide customers with device trust, data trust, and automation at an IoT scale. Machine identities and machine identity management are about the endpoints and their supporting infrastructure, and together we make it possible to balance efficiency, automation, and security across the digital ecosystem. Considering IoT and machine identities are top drivers for the adoption and deployment of PKI, and given the rapid evolution of both landscapes, cybersecurity has become increasingly critical.”

T-Mobile and Deutsche Telekom Launch T-IoT for Enterprises

T-Mobile US and Deutsche Telekom AG introduced T-IoT, a complete enterprise solution for global IoT connectivity, support, and administration.

T-IoT provides businesses with a single worldwide staff and a single global solution to manage all of their cross-border connections! It will be offered in 188 destinations and on 383 networks around the world.

In addition, there is limited flexibility in how businesses pay for IoT. Each carrier has its own payment strategy, making it difficult for companies to efficiently deploy IoT globally. Scalability will be even more crucial with 5G to enable meaningful use cases, analytics, data insight, and ROI.

T-Mobile and Deutsche Telekom have teamed up to bring T-IoT to the masses. This global service embodies two terms that aren’t often connected with the Internet of Things: simple and versatile.

President, T-Mobile Business Group, Mike Katz said, “The Un-carrier rewrote the rules of wireless. Now, as America’s 5G leader, with the fastest, largest, and most reliable 5G network, we’re writing the rules of the 5G era, and we’re doing it in favor of customers and businesses. With T-IoT and our award-winning networks, we’re poised to help businesses realize the true potential of IoT by completely disrupting the status quo of how IoT is purchased and managed.”

“One provider. One solution. That’s ‘making it simple’ taken at its word. Many industries, such as healthcare or automotive, depend on international supply chains. And their customers today rely on receiving service and assistance anywhere in the world. We’re able to do that with this transatlantic collaboration, with our networks, for the best customer experience worldwide,” says Hagen Rickmann, Managing Director Business Customers, Telekom Deutschland.

Senior Vice President Research and Development, Volker Lang says, “We combine digital medical solutions and state-of-the-art communication technology. With Home Monitoring, the patient’s vital data is digitally available to the medical team and is constantly analyzed. If threshold values are exceeded, the medical team can react immediately. This only works with an absolutely reliable network that transmits the data reliably at all times. We are active in over 100 countries. The T-IoT infrastructure is indispensable for us.”

CORL technology introduces a medical device risk assessment tool kit that protects medical and IoT devices!

CORL Technologies has launched a toolkit to test medical device safety against medical device and IoT risks.
CORL is committed to driving and delivering measurable risks presented by third-party vendors, including manufacturers of medical equipment. To that end, the organization has launched a new Device Risk Assessment Tool Kit that incorporates CORL self-awareness to work with the country’s leading health systems, standards organizations, and medical device manufacturers.
The CORL medical device risk assessment toolkit includes a list of risk assessment questions that use CORL risk intelligence data to perform thousands of medical device safety assessments. The new diagnostic toolkit examines medical equipment manufacturers and specific products, equipment, and performance models of health care organizations.
“The CORL medical device risk assessment tool kit is extremely valuable to our organization,” said Monique Hart, Executive Director, Information Security at Piedmont Healthcare. “The industry needs new models to reduce the risk of cybersecurity introduced by medical devices. CORL’s ability to harness the power of big data and specialized expertise in medical device security has greatly enhanced our diagnostic and therapeutic processes to protect the safety of our patients and the organization. ”
CORL medical device testing model and technology integrates device testing and product across security areas including disaster risk management and control, network and services, physical security, authentication, and life cycle controls for secure development.

Canon Solutions America and Symphion formed Partnership to Provide Comprehensive Print Fleet Cyber Hardening

Canon Solutions America, Inc., a subsidiary of Canon U.S.A., Inc., announced the addition of Symphion’s Printer Fleet Cybersecurity as a ServiceTM to its wide set of security solutions, as part of a strategic collaboration with Symphion, Inc., a leading security configuration management software and services firm. This relationship represents a significant commitment to providing Canon Solutions America clients with a fully inclusive solution that covers entire print fleets—including all makes, models, and ages—beyond the company’s security feature-rich printers and device management software.

Business executives are recognising the risk that Internet of Things (IoT) devices, such as printers, pose to their cybersecurity, as well as the severe financial repercussions of inaction. Printers have significant onboard security features, including up to 300 configurable security settings, but these configurations are frequently not used on networks due to cost and technical constraints, leaving these vulnerable devices entirely unsecured is truly the biggest network security risk in recent years.

There wasn’t a real vendor-agnostic solution to address this problem until Symphion. The fact is that large print fleets have hundreds to thousands of devices, each with its own set of makes, models, types, and ages, and no common configuration management system. Printer Fleet Cybersecurity as a Service provides full print fleet cyber hardening solutions as a turnkey service, without involving any customer personnel or contractors to solve this gap and cyber harden all print equipment in big print fleets.

“We’re proud to add industry leader Canon Solutions America as a Symphion partner. With Symphion, they’re clearly taking a leadership position by addressing the global cybersecurity gap that customers face,” said Jim LaRoe, chief executive officer, Symphion, Inc.

“We are excited to build on the success of our Canon Solutions America 5 Pillars of Security offerings with the addition of Symphion’s Printer Fleet Cybersecurity as a Service solution to our portfolio. We continue to develop relationships like this to support our commitment to providing best-in-class cybersecurity services to help our customers keep their proprietary data safe. We look forward to collaborating with Symphion on emerging, innovative security solutions,” said Peter P. Kowalczuk, president, Canon Solutions America.

SoftServe obtains Security Specialization in Google Cloud Partner Advantage Program

SoftServe, a global digital authority and consulting firm and Google Cloud Premier Partner, has earned the Google Cloud Partner Advantage Program’s Security Specialization after demonstrating its experience and competence in developing security solutions on Google Cloud’s Platform.

“We are excited to add this Security Specialization at a time when cybercrime is becoming ever more prevalent and attacks are becoming more sophisticated. Time tested expertise in digital security on Google Cloud differentiates SoftServe as a trusted advisor and provider to enterprise clients focused on keeping their organization and reputation secure on their digital transformation journeys,” said Todd Lenox, VP Alliances and Partnerships at SoftServe.

The Google Cloud Partner Advantage Program connects qualified partners with Google Cloud customers that have established technical proficiency and proven performance in specific solution and service areas. SoftServe’s proven ability to secure customer infrastructure and workflows to Google Cloud is demonstrated by the Security Specialization.

In April 2017, SoftServe joined Google Cloud’s Partner Advantage Program, and in August 2018, it was named a Google Cloud Premier Partner. It also offers specialisations in Data Analytics, Machine Learning, Infrastructure, Internet of Things, and Cloud Migration.