Download PDF version Contact company

Device Authority, a globally renowned company in identity and access management (IAM) for the Internet of Things (IoT), and Trusted Objects, a global player in cyber security technologies for embedded systems and cloud device management platforms, have announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform.

Last year, Trusted Objects joined the KeyScaler Ready programme, which enabled both teams to work closely together to provide a combined solution for IoT Edge devices.

IoT security solutions

IoT security solutions must be adapted to manage connected device constraints, including limited computing capabilities, lower cost, power consumption and scalability. Trusted Objects’ TO-protect RoT is based on state-of-the-art technologies, in order to protect IoT devices, including innovative embedded secure libraries for generic microcontrollers.

TO-protect also offer a lower cost alternative to a Secure Element or TPM, enabling:

  • Easy to integrate on-device software RoT,
  • Prevention against logical and physical security attacks on IoT devices exposed to threats,
  • Pre-validated SDKs to work alongside various chipset families,
  • Fully integrated in several IoT chains to achieve a Chain of Trust,
  • Compatible with existing hardware (no redesign / no impact on the BOM), and
  • Easy security retrofits for devices already in the field with MCU FOTA (Firmware-Over-The-Air).

TO-protect RoT and KeyScaler integration

Integrating TO-protect RoT with KeyScaler enables full end-to-end Security Life Cycle management, from Edge to Enterprise

Integrating TO-protect RoT with KeyScaler enables full end-to-end Security Life Cycle management, from Edge to Enterprise, into any IoT Cloud application, for example - Microsoft Azure, Avnet IoTConnect, AWS, Ericsson, PTC ThingWorx, Google.

Utilising software RoT in IoT deployments meets the needs for robust device security and also, at the same time, providing scalability to meet the needs of new and legacy device deployments.

This software model works incredibly well for distributors, such as Avnet, who can provide device software ‘SKUs’ for OEMs and enable Security Lifecycle Management into the Avnet IoTConnect platform, and at the same time, help save the customer BOM cost and potential redesigns.

Edge to Enterprise solutions with KeyScaler

Darron Antill, the Chief Executive Officer (CEO) of Device Authority, said “The integration of TO-protect to KeyScaler showcases how easy it can be to build Edge to Enterprise solutions with KeyScaler, to meet the needs of our customers and channel partners.

Darron Antill adds, “The Trusted Objects solution offers a disruptive alternative to TPMs and SE where cost and redesign are prohibitive. It’s great to see our teams collaborate to bring this software root-of-trust based solution to market.

Identity and access management for constrained IoT devices

The integration of our TO-protect software RoT to KeyScaler was very straightforward"

Sami Anbouba, the Chief Executive Officer (CEO) of Trusted Objects, stated “This partnership is another milestone on our journey in securing the IoT. We have demonstrated that our technologies enable identity and access management for constrained IoT devices securely and at scale. The integration of our TO-protect software RoT to KeyScaler was very straightforward and we are confident that it will run the same way with our customers.

Lou Lutostanski, Vice President of Internet of Things (IoT), Avnet, said “Our customers and suppliers are demanding software alternatives to Secure Elements and Trusted Platform Modules. Having software and hardware options enables us to serve our OEMs, in order to meet the needs of their go-to-markets.

Device Authority - Trusted Objects partnership

Lou Lutostanski adds, “Connecting TO-protect to KeyScaler and KeyScaler to our IoTConnect platform brings Security Lifecycle Management and Automation to our customers, to solve their identity and key management challenges that they face every day. This software alternative to secure hardware, combined with the secure programming capabilities, offered by Avnet Programming Centres, makes it a viable solution to solve the logistics issue faced by our customers, when deploying their products.

Download PDF version Download PDF version

In case you missed it

How can the industry do a better job of promoting emerging technologies in physical security environments?
How can the industry do a better job of promoting emerging technologies in physical security environments?

By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies ma...

Dahua & KITT Engineering's LED screen innovations
Dahua & KITT Engineering's LED screen innovations

About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have complete...

Protect assets with BCD's hybrid cloud NVR solutions
Protect assets with BCD's hybrid cloud NVR solutions

Like any retail franchise, car dealerships that have multiple locations nationwide require comprehensive, reliable, and scalable video surveillance solutions to protect their busin...

Quick poll
What is the most significant challenge facing smart building security today?