Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

IoT Security Server

Data protection to meet the security challenges of the Internet of Things

How can you guarantee the security of your IoT data?

Protect your data with Atos’s IoT Security Server solution

Secure identity management is at the core of security in the digital world. The growing number of connected devices in the Internet of Things (IoT) results in increasingly complex system interactions that must be managed.

The Atos IoT Security Server safeguards connected objects, their communications and the exchanged data, providing a secure, compliant and scalable solution to face these new challenges. We support your enterprise in your digital journey, allowing you to focus on growing your IoT business.

The IoT Security Server provides functionality for the entire gamut of IoT device security management, which is critical to control the lifecycle of your devices and networks.

Manufacturers can rely on our solution to securely distribute device keys or certificates while the inner database mechanisms are coupled with Atos HSM products, making it easy to securely store device-related information. This information is vital to provide full protection of data at rest, and to guarantee secure device communications.

Atos cybersecurity IoT security Security server

Scalability and performance

As the number of connected devices is expected to reach tens of billions, our solution is designed to be highly scalable, with multiple active instances within a possible redundant architecture to handle major growth in the future.

Flexible deployment

The IoT Security Server can be deployed on-premises or in SaaS mode to be operated as part of an MSSP SOC, or it may be hosted in secure data centers managed by Atos.

Supporting growth

The modular design of Atos IoT Security Server enables smooth deployment of a solution tailored to your organization’s needs. It can also be integrated with different partners to build a complete end-to-end IoT security solution.

Specifications

Supported profiles

Telecom (LoRa)

  • Network service (Join/Rejoin, VeryMIC Requests)
  • Applicative service (GetAppSKey Requests)
  • Device management (enrollment, lifecycle management, manufacturer management)

Utilities (Smart Meters)

  • Smart meter device management
  • Manufacturer management
  • Key exchanges
  • Message encryption/decryption
  • Provider management
  • Logistics flow
Markets and standards
  • LoRaWAN v1.0 and v1.1
  • DLMS/COSEM (IEC 62056)
  • Car2Car Communication Consortium (C-ITS)
Environment

Hosting hardware and software

  • Physical Servers: 32/64 bit platform with at least 4 Gb of RAM, 10 Gb of available disk memory, 2 Ethernet ports
  • Virtual Machines: VMWare or HyperV
  • Operating System: Red Hat 6 or 7 (32 or 64 bits) / SUSE SLES 10 or 11 (32 or 64 bits)
  • Database: Cassandra or PostgreSQL (external base in 3 tiers architecture)

Workstations for administrators

  • Browser: Internet Explorer 8 version and later, Firefox or Chrome
  • Operating System: Windows XP (Service Pack 3) / Windows 7 / Windows 8 / Windows 10
  • HSM: HSM with IoT dedicated functions: Trustway Crypt2pay with IoT extensions

Related resources

Atos cybersecurite Security Server en

Security Server factsheet

Securing the value of the IoT

Manage more and more complex system interactions while securing connected objects, communications and data exchanges.

Atos cybersecurite IoT expert advice

Expert advice

A centralized security infrastructure for the IoT

Vincent Kahoul offers an alternative model using a centralized security infrastructure able to deliver and inject digital identities in IoT devices such as electronic certificates and keys.

Other IoT security products

CardOS for IoT

Secure authentication & trusted identity delivering assurance and efficiency to IoT.
Visit product page >

PKI for IoT

Complete solution for the creation & lifecycle management of digital certificates for IoT.
Visit product page >
Trusted Blockchain - Blockchain security

Trusted Blockchain

Decentralized management of multi-actor confidence.
Visit product page >

Interested in our IoT Security Server?