The media and entertainment industry is as close to home as it gets. The set top boxes, broadband routers, and 5G gateways are at your doorstep. The implications of data privacy and protection for the consumer are paramount here given the nature of home surveillance systems and information gathering that occurs here. For the business, the major risks are loss of revenue from clones, piracy and theft of bandwidth, and flight of intellectual property. In a competitive marketplace with online stores for home-based entertainment platforms, this industry is poised to stream content and containerized applications to edge cloud platforms. This raises the bar for data privacy and protection at higher data rates, and trusted data for artificial intelligence and analytics at the backend.
The strategy will require at least:
Smart Home: 5G Gateway
The global smart city market will reach US$1.565 trillion in 2020, with one-half of smart cities from North America and Europe.
— Frost & Sullivan
Perimeter-based defenses and threat detection technologies are not enough to defend against modern cyber attacks. Many smart city lighting, smart meters, surveillance systems, fire and safety systems, HVAC, thermostats, building scanners, lighting, elevators, and Internet of Things (IoT) edge devices are vulnerable due to a lack of strong cryptographic controls, including: multi-factor authentication, secure boot, secure update, and secure, encrypted communications.
Smart building technology manufacturers and building operators must ensure compliance with cybersecurity standards such as NIST 800-53, IEC 62443-3-3, and FIPS 140-2. Keeping up with these standards as well as emerging standards from the Industrial Internet Consortium (IIC) and Industrie 4.0 can be challenging.
A Cybersecurity System Tailored for Smart Homes
Used by more than 200 OEMs to protect more than 100 million devices
Mocana’s end-to-end security system is an FIPS 140-2 validated embedded cybersecurity software solution that ensures device trustworthiness and secure communications by giving industrial automation manufacturers, OEMs and critical infrastructure operators an easy way to harden electronic control units and controllers with multi-factor authentication and trust chaining, as well secure boot to validate the firmware, OS and applications.