Horus – Trusted Identities for Devices and Individuals

Build a trusted ecosystem for your digital identity security

Data integrity and operation facilitation for Operators

How to deploy secure and scalable IoT networks?

With the huge deployment of IoT technologies, communication service providers are rolling out many dedicated networks. While adopting these new industry standards, such as Low Power, Wide Area (LPWA) networking protocols, they must also ensure that these systems are secure and that data privacy is maintained.

To address these challenges, network operators should consider the following security problematics:

 How to secure the network and communication infrastructure
How to securely facilitate large-scale operations while maintaining performance
 How to control manufacturers and devices accessing the network

Secure the data in transit from millions of devices

To follow or contact us:
Linkedin | Twitter

Watch our webinar on IoT communication security

How we can help you deliver assurance and efficiency to IoT

Infrastructure security

IoT operator’s networks are based on infrastructure which needs to be secure (gateways, antennas, …). Through the Horus Security Server, you can automatically and securely enroll them to obtain keys associated with their use and management of their lifecycle (creation, consultation, suspension and deletion). The solution made by Atos is designed to be highly scalable (multiple active instances within a possible redundant architecture) to meet upcoming growth.

More

Certificate management

You can provision and manage devices and digital identities securely with Horus PKI for IoT using a Hardware Security Module (HSM) for certificate management. Electronic certificates are used to support strong authentication for devices and data confidentiality for data in transit or in storage. PKI capabilities are provided on demand for IoT services, such as devices registry, enrollment and authorization for communication.

More

Data confidentiality & Integrity management

To meet regulatory requirements, frames on the networks need to be trusted by verifying the integrity of the payload. Master keys can be managed in Hardware Security Modules (HSM), such as the Horus crypt2pay, deployed on the production lines, for the injection of the derived keys into the devices, and on the operator information system for the security of the frames exchanged in the IoT ecosystem.

More

What our clients say about us

Global security solution for the IoT LoRa ecosystem of Objenious

“Atos is a trusted partner and not just a security software company.” Philippe Cola, Core Network Senior Architect, Bouygues Telecom, Ojenious.  Discover how Atos enabled Bouygues Telecom to become a global IoT vendor that offers clients peace of mind through end-to-end security.

Case Study

Related resources

Press Release

Atos releases the Horus security suite for Intelligent Transportation Systems

See how Atos can secure communications in connected vehicles.

White Paper

‘Things’ Matter: The New World of IoT Security

Discover how to Protect IoT deployment through 4 Steps: analytics, identity and lifecycle management, data security, and communications.

Webinar

How to secure end-to-end IoT communication?

Discover how to secure your IoT communication, illustrated with a Bouygues Telecom use case (solution operated and commercialized by Objenious)

Partnership

Become one of our partners

Achieve success with your customers through dedicated training and certification programs, as well as customized support to respond to clients’ needs.

Interested in our Digital Identities products?