Design News is part of the Informa Markets Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Managing Identities and Data Security Vital for Industrial IoT

Model for IoT Security
New security solutions are supporting digital business by providing trusted interactions between people, systems and devices along with faster, more secure access to IoT data.

Cybersecurity risks for industrial control systems are continuing to increase from threats via industrial espionage, to actual physical damage and financial loss due to downtime.  A key trend moving ahead is new technology addressing critical areas including asset and material tracking, enhanced HMI authentication and stronger VPN credentials.

A focus on secure flow of data from sensors to cloud data hubs creates an ecosystem where devices, applications and employees can receive updates on system stability and device lifespan more quickly. But overall, there is a focus on two areas: managing identities and new levels of technology-enabled secure communications.

Supporting New Levels of Enterprise Connectedness

Today, digital businesses are striving to create business models that turn stand-alone products into highly interactive and connected services, but are faced with a variety of challenges ranging from complicated integrations and extended deployment timelines to mitigating safety and privacy concerns.

Entrust Datacard, a provider of trusted identity and secure transaction technology solutions, recently announced its new ioTrust security solution. The idea is to deliver a secure and trusted digital infrastructure that safeguards data between devices, sensors, and backend platforms connected within an Internet of Things (IoT) ecosystem. By applying digital identities managed using definable policies, the new platform allows companies to create the trusted products and experiences that new production environments demand.

The ioTrust technology is focused on three areas: trusted identities, data security and creating an effective enterprise-wide architecture. A secure and trusted ecosystem of people, applications and devices enables greater supply chain visibility and is designed to span over the entire device life-cycle. Key technologies include cryptographically-enforced access control to data and functions using a hardware/software agnostic platform for managing heterogeneous industrial control environments.

To create industrial control system IoT ecosystems, there is a need to support a wide range of data and communication protocols, using edge and service gateways along with agents to manage identities and created secure data paths. A trust-based model for IoT security leverages validation services (OCSP/CRL), end point agents, hardware security modules and effective software tools and management consoles to manage what becomes a complex system for protecting key assets.

A trust-based model for IoT security uses validation services (OCSP/CRL), end point agents, hardware security modules and management consoles to manage identities and create secure data paths.Image source: Entrust Datacard

Encryption, Authentication and Authorization

Enterprise-grade encryption technologies and expertise in establishing identity-based, trusted infrastructures includes capabilities such as identity, authentication and authorization, credential lifecycle management, and secure communications. The system uses deployment timelines, allowing organizations to more quickly realize business value in areas such as process optimization and automation, supply chain visibility, and delivery of new services. It is designed to secure IoT data across a variety of industries including industrial control systems, automotive, telecommunications and manufacturing supply chains.

A trusted Internet of Things ecosystem includes the following:

•    A secure ecosystem of people, applications and devices throughout the IoT value chain
•    Greater security visibility, spanning from device manufacturer to the final product
•    Reducing time-to-market and total cost of ownership using solutions based on heterogeneous device categories and profiles
•    An ability to leverage existing infrastructures and devices, while supporting new products and services without the need to “rip and replace”
•    Secure and timely delivery of data and outcomes

“Unlike existing solutions that have been simply repurposed from IT environments, Entrust Datacard has spent several years working with customers and ecosystem partners to design a solution that recognizes the unique needs of IoT environments and incorporates sound security practices,” Josh Jabs, vice president of PKI and IoT for Entrust Datacard wrote in a recent press release. “We’ve created a solution that allows organizations to enhance their service offerings, improve the user experience and enable new business models while leveraging a trusted infrastructure.”

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.