Securing small IoT devices is difficult. Constrained devices, such as 8-, 16-, and 32-bit processors - typically found in operational technology (OT), building automation, smart building, smart grid, automotive industrial IoT, and medical IoT products - lack the computing and memory resources needed to implement legacy security methods. The challenge is magnified by the threat quantum computing poses to classical cryptographic protocols, such as ECC and RSA. Our small-footprint, quantum-resistant security solutions address these IoT and OT security issues.
Veridify has solutions for end-users and OEMs to implement future-proof IoT cybersecurity. Software development kits (SDKs), RTL, and tools are available for a wide range of microprocessors and environments.
Embedded and add-on cybersecurity solutions for protecting new and existing building automation systems and other critical building Operational Technology (OT)
- Stop cyber attacks before they happen
- NIST-compliance Zero Trust framework
- Device-level protection
- Retrofit existing building networks
Device Ownership Management and Enrollment - Embedded cybersecurity solutions for protecting new and existing building automation systems and other critical building Operational Technology (OT)
- Transfer ownership in the field and securely connect to a device without a network or cloud connection
- Creates a unique lifetime pedigree for each device in a blockchain
- Requires only 8K of ROM to implement, ideal for the smallest IoT devices
- Zero-touch, enables the secure installation of devices, even for those with no user interface
Rapidly apply authentication and data protection to your new or existing platforms with fast, ultra-low-energy, and quantum-resistant protection for 32-, 16-, and 8-bit devices and embedded platforms. The IoT Embedded Security Development Kit enables you to use Veridify’s quantum-resistant, low-resource, Group Theoretic-based cryptography to provide authentication, confidentiality, and non-repudiation for your own devices. Key cryptographic components include:
- Walnut Digital Signature Algorithm
- Ironwood Key Agreement Protocol