
In this quickfire video with Patrick Donegan; the Founder & Principal Analyst at HardenStance and Stephane Quetglas; the Embedded Solutions Marketing Director at Thales, you can explore the fundamentals of IoT security against a vast range of use cases in the IoT market. Their talk highlights the variability of needs across industries, applications and even individual companies with differing risk tolerances; all while illuminating two core truths in ‘Security by Design’ and the ‘Root of Trust’ approach.
This conversation covers a vast range of issues including:
- What ‘Security by Design’ means – By integrating these measures from the initial design phase rather than as an afterthought, you’ll have a robust and secure foundation on which to build.
- Why ‘Root of Trust’ matters – Implementing a secure and immutable identity within every IoT device to guarantee secure communication and data integrity creates an anchor for critical functionalities like authentication, encryption and tamper detection.
- The key factors shaping requirements – They discuss weak authentication and authorisation, software or firmware tampering, the level of end-to-end security needed and device lifespans. All these elements impact IoT security requirements.
- Why the right partner matters – Niche specialists can often be pitted against the larger players in the market. But looking for solutions that can cater to a mix of cellular and non-cellular devices will offer connectivity-agnostic protection across various verticals and that’s the approach they recommend.
- How regulation is changing things – Learn why the lack of a universal standard and the variability of regulations across regions and industries requires a modular approach to IoT security solutions that can be tailored to specific regulatory constraints.
In this interesting and fast-paced conversation, learn from a true expert in this space and explore how a modular solution that caters to diverse security needs, device types and industry verticals could support your further business growth. Capabilities like secure identity injection during production, identity management throughout the device lifecycle, secure software updates and integrity verification are no longer nice-to-haves; they are becoming the standard.