Cyber Protection as a Service

 

Delivering Cyber Protection as a Service via our software solution suite, TrustCenter, TrustPoint and TrustCore.

All of our products enable simple and scalable development & integration. Our approach is to provide an operations platform for tamper-resistant device lifecycle management that requires zero-coding, and a development platform to harden and analyze device functions with minimal to no reengineering of applications.

 

Mocana Solution
Mocana Solutions
Mocana TrustCenter

The Mocana TrustCenter operations platform provides a tamper-resistant and scalable workflow for transfer of ownership and lifecycle management of devices fully integrated with authentication and certification services. Automates provisioning, orchestration and management of devices for scalable enrollment and tamper resistant software updates. TrustCenter may be managed using a web-based user interface or via REST-based APIs integrated with a vendor equipment device management system.
Mocana TrustPoint 

Mocana TrustPoint is a comprehensive software solution for IoT device protection. Distributed as pre-compiled binaries, TrustPoint works seamlessly with TrustCenter to provide embedded perimeter controls, authenticated and automated key management for network traffic encryption, trusted platform measurements and event tracking for live analytics – to prime third-party orchestration, artificial intelligence and machine learning services in the cloud.
Mocana TrustCore

The Mocana TrustCore development platform provides an innovative solution to empower application developers with a simple set of APIs to leverage data privacy and protection controls for safety, security and compliance without extensive re-engineering.
How It Works
Mocana How It Works
Who Benefits
icon-who-benefits-oem-odm
OEM/ODM
  • Baked-in protection controls at point of manufacture
  • Contract manufacturing of factory hardened devices for tamper-proofing and anti-cloning
  • Bolt-on hardware-based discrete root of trust anchor
  • No factory-default passwords (protected device configuration)
icon-who-benefits-service-provider
Service Provider
  • Offer cyber protection as a service to device operators as a utility model
  • Drive revenues in the emerging 5G network and edge cloud (smart cities, smart factories, smart energy, smart transportation)
  • Authenticated device onboarding, updates with supply chain protection, risk monitoring and reports
  • Usage based billing with subscription-based level of protection
icon-who-benefits-device-vendor
Device Vendor
  • Contract manufacturer configures and hardens devices at factory, as per protection profile
  • Activate and provision the hardware-based root of trust
  • Issue birth certificate to license device
  • Track and count on-shelf and licensed inventory
  • Revoke device certificate to cancel license
  • Provision services and application post device onboarding and transfer of ownership for intellectual
    property protection
icon-who-benefits-device-owner-operator
Device Owner/Operator
  • No cloud platform or service provider lock-in
  • Buy protection instead of build-it-yourself with engineering and certification cycle
  • Protect brownfield silos without application reengineering
  • Ensure interoperability of greenfield and brownfield connected devices for digital transformation of infrastructure
  • Eliminate the steep costs and operational complexity of PKI build-out
  • Provide data privacy and protection for mission critical applications with cryptographic key management
  • Increase operational efficiency and integrity
Unique Benefits
icon-new-harden-devices
Harden Devices at Factory
icon-new-tamper-resistance
Tamper Resistance over Lifecycle
icon-new-authenticated-device
Authenticated Device Onboarding and Provisioning at Scale
icon-new-secure-timely
Secure & Timely Software and Configuration Updates
icon-new-remotely-monitor
Remotely Monitor & Recover Devices
icon-new-measures-device
Measures Device & Platform Integrity with Root of Trust Attestation
icon-new-protection-baked
Protection Baked into the Supply Chain
icon-new-multiple-signers
Multiple Signers for High Assurance and Resiliency
icon-new-perimeter-less

Perimeter-less Network Defense

icon-new-data-privacy

Data Privacy and Protection

Resources

The latest thoughts on cybersecurity
management.

Solution Briefs

Learn More

White Papers

Learn More

Datasheets

Learn More

Videos-Podcasts

Watch/Listen

Webinars

Learn More

Case Studies

Learn More