Product: IoTAS Overview 2017-08-24T22:50:16+00:00

Internet of Things Advanced Security – IoTAS

Purpose-Built IoT Security

CENTRI Internet of Things Advanced Security – IoTAS is a complete, standards-based IoT security platform enabling IoT manufacturers and developers to easily implement device integrity, data protection, optimization and data intelligence into their products and services.

The flexible, software-only solution is embedded from chip to Cloud to secure and compress all data in motion and at rest, to protect data privacy and eliminate the risk of launching IoT products. IoTAS uses modern encryption, patented cache mapping technology and efficient algorithms resulting in superior security and device performance.

Get to market faster and replace insufficient DIY tools with a patented, purpose-built IoT security solution you can trust.

IoTAS Protects Your IoT Data and Devices

CENTRI IoTAS installs on endpoints, gateways and the Cloud with a footprint of only 50kB. The solution establishes device integrity using hardware-based ID on initialization between device and the Cloud to ensure only known, trusted endpoints can communicate. IoTAS encrypts and optimizes all data simultaneously on or between those connections – endpoint to Cloud, endpoint to endpoint or Cloud to Cloud.

User-friendly administrative dashboards provide intelligence and insights to manage devices and access forensics and analytics on all security data. IoTAS supports multiple APIs to connect to other business intelligence systems and back office solutions.

IoTAS is Complete, Flexible and Intelligent

As an IoT developer your expertise is delivering the latest IoT innovation. Ours is securing it. Let us take the difficulty and risk out of IoT security for you and your customers. IoTAS delivers peace of mind, speed, and simplicity for IoT developers tasked with securing their IoT offering.

Features

  • Data governance
    Every byte is optimized and encrypted – no byte is ever sent in the clear; only trusted stakeholders can access the data
  • Fast, secure authentication without certificates
    Certificate-less technology uses hardware-based ID to establish device integrity
  • Cache mapping technology and efficient algorithms
    <2% CPU utilization maximizes uptime of low power mission-critical devices
  • Simplified key management
    “Vault-less” technology removes the expense and risk of key management and an HSM for data at rest
  • Encrypted search of big data
    Search and access encrypted Big Data without having to decrypt it
  • Security data intelligence
    Complete visibility to your data and devices with forensics, analytics and user administration

Benefits

  • Complete risk mitigation
    Stop piecing together separate security tools that leave you exposed – IoTAS provides complete protection of your data in all states to reduce your risk
  • Get to market faster
    Today’s IoT market is a race – IoTAS is turnkey so you don’t waste time getting it to work; faster time to market, happier product teams and customers
  • Simple to deploy
    Platform agnostic, designed for IoT developers in mind with simple replacement of insufficient DIY tools such as SSL/TLS
  • Handles the data spike
    The increase in data traffic from IoT squeezes networks and Cloud storage, IoTAS compresses the data up to 80% to save bandwidth and Cloud storage costs
  • Purpose-built for IoT
    Small 50kB footprint, provides complete data and device integrity, designed for the trusted endpoints of IoT

IoTAS Uses Widely Accepted Cryptographic Standards

Device Security

Key Exchange

Data Encryption

Message Authentication

Key Derivation Function

Hardware-based ID to guarantee IoT device authenticity Elliptic Curve Diffie-Hellman Cryptography (ECDH) 25519 (Daniel Bernstein, 2005) used by Apple iOS Salsa20 (Daniel Bernstein, 2005) symmetric key cipher certified by EU eStream in 2007 ChaCha20 (Daniel Bernstein, 2008) secret-key message authentication code used by Google Chrome SHA-512 (FIPS 180-2 publication) cryptographic hash function designed by the National Security Agency

Technical Specifications

Specifications

IoT Endpoint

Cloud

Platforms Supported Android, iOS, Linux, Windows Linux, Windows and all major platforms, including AWS, Azure, Bluemix
Footprint As small as 50kB depending on features and architecture Less than 2MB depending on platform and architecture
Endpoint CPU Utilization <2% N/A