Horus – Trusted Identities for Devices and Individuals

Build a trusted ecosystem for your digital identity security

Data confidentiality and integrity for IoT Business Owners

How to protect the confidentiality of your trusted data?

Security should not be a constraint to deploy new services: it has to be seamless. IoT business owners need to have a full trust in their data, from end to end, and comply with the current regulations, such as GDPR in the European Union. Moreover, end users want to be sure that the data is safe and that no compromising has raised.

To ensure that valuable data is secure, IoT business owners should consider the following security problematics:

 How to secure to deploy securely and seamlessly new services
How to process trusted data only
 How to trust manufacturers and devices connecting to their IoT services

Ensure data integrity through encryption and digital signature with a scalable solution

To follow or contact us:
Linkedin | Twitter

Watch our webinar on IoT communication security

How we can help you deliver assurance and efficiency to IoT

Data encryption

To meet regulatory requirements, frames on the networks need to be trusted by verifying the integrity of the payload. Master keys can be managed in Hardware Security Modules (HSM), such as the Horus crypt2pay. Compliant, flexible and secure, it reinforces the authenticity of the electronic signature by securing keys and calculating the electronic signature in a controlled environment.

More

Timestamp data

Timestamping and anti-replay mechanisms can help to provide data confidentiality and integrity. Horus metatime is aiming for the enhancement of electronic exchanges’ trust. Compliant with the eIDAS regulation, this solution provides a trusted date and time when the data is received with an element of proof

More

Digital signature

Electronic signatures guarantee the integrity of documents and identify the signers. Once a signer or a device has produced a signature and the signature has been verified, the signature is secure and may no longer be repudiated. Horus metasign creates and verifies electronic signatures for proof and auditability.

More

What our clients say about us

Global security solution for the IoT LoRa ecosystem of Objenious

“Atos is a trusted partner and not just a security software company.” Philippe Cola, Core Network Senior Architect, Bouygues Telecom, Ojenious.  Discover how Atos enabled Bouygues Telecom to become a global IoT vendor that offers clients peace of mind through end-to-end security.

Case Study

Related resources

Press Release

Atos releases the Horus security suite for Intelligent Transportation Systems

See how Atos can secure communications in connected vehicles.

White Paper

‘Things’ Matter: The New World of IoT Security

Discover how to Protect IoT deployment through 4 Steps: analytics, identity and lifecycle management, data security, and communications.

Webinar

How to secure end-to-end IoT communication?

Discover how to secure your IoT communication, illustrated with a Bouygues Telecom use case (solution operated and commercialized by Objenious)

Partnership

Become one of our partners

Achieve success with your customers through dedicated training and certification programs, as well as customized support to respond to clients’ needs.

Interested in our Digital Identities products?