Exosite Blog

IoT Security: Understanding Platform Features

By Exosite on August 11, 2016

<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >IoT Security: Understanding Platform Features</span>

There are many pieces to developing successful connected product deployments and with so many moving parts it can be difficult to decide where to start. Companies often jump into the Internet of Things pool with a proven and tested connected product that lacks one major feature, IoT security. As a leading consumer and industrial IoT platform provider, Exosite is invested in ensuring the security of its clients.

The Exosite platform has a number of cutting-edge IoT security features that act as building blocks to protect data at rest, in motion, and in use, including:

  • Secure Transmissions: API end-points are all available via SSL/TLS or Datagram Transport Layer Security (DTLS)
  • Secure Storage: Physical access to data stored on Exosite servers is restricted in several ways
  • Device Authentication: Device identities are protected via temporal API keys that Exosite calls Client Interface Keys (CIKs)
  • User Access and Authentication: Users are authenticated in several ways and access can be tailored to any application
  • Manufacturing Integration: Exosite provisioning systems allows OEMs to manage full connected product fleets from manufacturing through usage and retirement
  • Time-Boxed Provisioning Windows: Once in the field, a multi-factor provisioning method occurs

For a full description of Exosite’s security offerings, download the full white paper below or contact us directly to ensure your IoT security today.
download IoT security white paper


Topics: IoT Strategy

Get Email Notifications