Trusted Objects

Nexus and Trusted Objects partner to expand secure digital identity to all IoT devices

According to IoT Analytics, the global number of connected IoT devices has hit 12 billion active endpoints; by 2025, there will likely be more than 27 billion IoT devices connected. This trend will inevitably lead to an increasing number of cyberattacks and will result in greater risks for enterprises. Securing the full IoT chain is becoming crucial. The cornerstone for device-to-cloud security is the capability to assign to each device a unique digital identity and to manage it securely all along the life cycle.

Nexus develops the Smart ID IoT software and Nexus GO IoT cloud platform which enables companies from all industries to issue and manage the lifecycle of trusted identities for IoT devices. This is achieved using Public Key Infrastructure (PKI) security technology that provides secure digital identities in the form of cryptographic keys and digital certificates.

Securely provisioning, storing and managing these keys and certificates inside IoT devices is a major challenge for IoT application providers. Trusted Objects and Nexus Group have worked closely to fill the gap; the two companies offer a joint security solution to manage devices’ identities automatically over the lifetime of the devices; from manufacturing to usage in the field. In this way, all IoT devices, including those with limited computing power and communication bandwidth, can secure device-to-cloud or machine-to-machine communication and firmware upgrades.

Trusted Objects provides innovative solutions including secure software and secure operations to dramatically enhance the whole security chain, from device to cloud. Trusted Objects to-security products and services for constrained devices are positioned to create trust all along the value chain including devices, networks, clouds, and manufacturing. Jean-Pierre Delesse, COO and co-founder of Trusted Objects, declares: “Thanks to great synergies and complementarities with Nexus, we could reach an important milestone of our mission to secure the IoT applications. We are eager to continue this cooperation with Nexus and together change the game in the field of IoT security”.

Tamás Horváth, Innovations Manager IoT at Nexus Group says: “IoT device manufacturers and application vendors should be able to focus on creating the core business value of their application and add security as an off-the-shelf solution. Our joint proposal with Trusted Objects provides automated certificate management and a secure communication solution very much transparently to the application software. IoT vendors can put a check on secure device-to-cloud communication.”

Trusted Objects and Nexus’ partnership empowers IoT device vendors and application providers to implement a seamless, secure, and automated certificate management solution in their supply chain and applications.

To learn more about the partnership and the joint solution, read the full press release here.

Published

About Trusted Objects
Trusted Objects is a leading independent player in cybersecurity technologies for embedded systems and cloud device management platforms. Trusted Objects provides innovative solutions including secure software and secure operations to dramatically enhance the whole security chain, from device to cloud. Thanks to its longstanding expertise, Trusted Objects designs products and solutions that change the game, with a focus on ease of integration and user-friendliness, while complying with the latest standards in terms of security. Trusted Objects to-security products and services for constrained devices are positioned to create trust all along the value chain including devices, networks, clouds and manufacturing.

Do you want to learn more about this and other projects?

Contact Us

 

 

Read the latest news

Blog CRA Cyber Resilience Act IoT IoT security Unkategorisiert

Das bedeutet das Cyberresilienzgesetz für Sie: Leitfaden für Hersteller zur Einhaltung der Vorschriften

16 Februar, 2024
The Cyber Resilience Act (CRA) is an EU directive currently being deliberated by the European Parliament that aims to enhance the cyber resilience ...
Blog Multi-Factor Authentication (MFA) NIS2 PKI Unkategorisiert Workforce Workplace Zero Trust

Vorbereitung auf NIS2 – Checkliste für betroffene Organisationen

13 Dezember, 2023
Gewährleisten Sie die #NIS2-Konformität für mehr Resilienz im Bereich Cybersicherheit. In unserem Blog erfahren Sie, ob Ihr Unternehmen betroffen i...
Blog IoT IoT security PKI Unkategorisiert Whitepaper/Guide Zero Trust

Sichere Geräteidentitäten ermöglichen Zero-Trust-Strategie für IoT & IIoT

23 November, 2023
In einer Ära, in der das IoT und IIoT dominieren, ist die Sicherung der angeschlossenen Geräte von größter Bedeutung. Unser Blog untersucht die Mac...