Operations Platform

The IoT Protection Challenge

A collaborative strategy is required between the device vendors and device operators in the field to manage cyber risks across the IoT industry. This supply chain begins in the fabrication lab of the semiconductor (chipset) vendor with a root-of-trust anchor (the secure element). The original equipment manufacturer (OEM) or original device manufacturer (ODM) must then integrate a root-of-trust anchor on the equipment (mezzanine board) as a contract manufacturer for the device vendors. The system integrator may then assemble hardened subsystem components from a plurality of device vendors for the specialized IoT industry. Finally, a device operator manages the operations, administration, maintenance and provisioning services.

With the advent of software-as-a-service (SaaS) utility models for capital and operational expense reduction, cybersecurity services for IoT devices will inevitably migrate to public, private, or community cloud-based IoT platforms. The passage from on-premise to on-cloud, and the adoption gap between the mainstream device vendors and the managed security service providers, needs to be bridged with a holistic cyber risk management platform that enables digital transformation in the IoT industry.

Protection Lifestyle

mocana-protection-operations-platform-protection-lifecycle-graphic

IoT Risk Matrix

The challenges, blockers to change, and the decisions required to embark on change vary across industry sectors. The policies and processes that have been engrained over decades of information technology (IT) dominance and stewardship may become the inhibitors of change without a strategy for change. The intrinsic nature of risks has changed and therefore the solutions must too.

Embracing digital transformation will require hardening the workflow and operations, and not clinging hopefully to out-of-date and cumbersome platform hardening guidelines. Security is not a point solution; it is a holistic chain – and it is only as strong as the weakest link in that chain. The effectiveness of security (from soft core to hard edge) requires baked-in controls; not bolted-on controls. The economics of security lies in multi-vendor collaboration as a forethought and not multi-vendor competition as an after-thought. The induction of modern controls must be strategic, measured and rational. Imminent risks have no term limits.

IoT Ecosystem Stakeholders

mocana-protection-operations-platform-risks-exposures-graphic

The IoT Ecosystem

The elixir to cure cybersecurity risks in IoT will require a prolonged and tenacious commitment to change. The rebirth of the Internet needs to be protection centric and must not relegate security initiatives to an IoT cottage industry in the wild that must defend against sophisticated cyber criminals and nation-state actors with reactive tactics. The transformative and economic potential of IoT requires both a microscopic and telescopic vision of cybersecurity. This has serious implications for cyber insurance companies as well.

The willingness of the insurer to pay off cybercriminals as a mitigation process for recovery of services and compromised devices will only encourage cyber-attackers – not discourage the cybercrime syndicate. If government regulators fail rise to the occasion and protect cyber commerce and data, the insurance companies will have to step up with guidelines for cyber resilience or suffer from the consequences of attacks on cyber infrastructure. Staying in the infinite game of cybersecurity, against a determined cyber adversary, requires the will and resources of all players in the supply chain.

The IoT Process

mocana-protection-operations-platform-iot-graphic

Learn More About Mocana Solutions

icon-trustcenter-white

Mocana TrustCenter™

Services platform for automated security lifecycle management
icon-trustpoint-white

Mocana TrustPoint™

Comprehensive IoT endpoint security that simplifies integration
icon-trustcore-white

Mocana TrustCore

Proven, differentiated and compliant system of cybersecurity
  • background-blue.jpg

    Connected devices are being deployed at a rapid pace, and security can no longer be optional. This is a shared industry responsibility, which is why Arm is working with partners including Mocana to shift the economics of security by providing a common framework for building more secure connected devices through PSA."

    Paul Williamson

    Vice President and General Manager, IoT Device IP, Arm

  • background-blue.jpg

    Mocana’s IoT Security Platform ensures that IoT devices can be trusted and communicate securely to the public and industrial cloud platforms. Their verification of the interoperability and integration of their cloud to AWS, Microsoft Azure IoT, VMWare-based clouds, and GE Predix is a significant benefit for companies working with Mocana."

    Vikrant Ghandhi

    Industry Director, Digital Transformation, Frost & Sullivan of Frost & Sullivan

  • background-blue.jpg

    We are excited to work with Mocana in implementing their comprehensive software solution across our divisions. With Mocana’s Security of Things Platform, we are able to maintain consistency in our security approaches, across any type of device or sensor, addressing the variance of real-time operating systems (RTOS), controllers and CPUs. Mocana brings strong FIPS-140 proven cryptography to our embedded devices all the way up to the cloud, enabling a safer path to IoT transformation for our connected business strategy."

    George Wrenn

    VP of Global Cybersecurity for Schneider Electric

  • background-blue.jpg

    The Mocana IoT Security Platform provides a comprehensive security solution for industrial IoT devices and industrial clouds, delivering deep cybersecurity to protect IoT implementations. We congratulate Mocana for their well-deserved industry recognition and look forward to seeing their continued product innovation in the IoT security market throughout 2018 and beyond."

    James Johnson

    Managing Director, IoT Breakthrough

  • background-blue.jpg

    The tools provided by Mocana are rooted in its long history of equipping engineers with the ability to harden devices that perform mission-critical operations. Manufacturers can now be equipped to leverage the power of the embedded chips in their products to support the security and privacy requirements of these emerging data-driven IoT ecosystems."

    Rob Westervelt

    Research Manager, IDC

  • background-blue.jpg

    Mocana TrustCenter automated security integrated with Intel SDO dramatically reduces the onboarding and digital certificate provisioning time to drive scale."

    Lorie Wigle

    VP Product Management, Platform Security Division, Intel

Learn more about the Mocana operations platform

Request a demo

Resources

The latest thoughts on cybersecurity
management.

Solution Briefs

Learn More

White Papers

Learn More

Datasheets

Learn More

Videos-Podcasts

Watch/Listen

Webinars

Learn More

Case Studies

Learn More