Horus – Trusted Identities for Devices and Individuals

Build a trusted ecosystem for your digital identity security

Easy device management for Manufacturers

How to manage your devices’ lifecycle and security?

When buying new products, consumers are more and more considering the security aspect, questioning if their smart devices are fully secure. Security is becoming a differentiator when purchasing an item. IoT product manufacturers are now giving more importance to device security through its whole lifecycle for a better brand reputation. The objective is to protect networked products from vulnerabilities while maintaining productivity.

3 security steps should be considered when manufacturing connected devices:

 How to securely and quickly onboard the new devices created every day
 How to control the life of the objects from creation to scrapping
 How to secure each device during their whole lifecycle

Manage several millions of devices through an enrolment portal and multi protocols to streamline secure deployment. 

To follow or contact us:
Linkedin | Twitter

Watch our webinar on IoT communication security

How we can help you deliver assurance and efficiency to IoT

Enrolment portal

Through the Horus Security Server, you can easily enroll your connected devices to obtain keys associated with their use and management of their lifecycle (creation, consultation, suspension and deletion). The solution made by Atos is designed to be highly scalable (multiple active instances within a possible redundant architecture) to meet upcoming growth.


Certificate management

You can provision and manage devices and digital identities securely with Horus PKI for IoT using a Hardware Security Module (HSM) for certificate management. supplies Electronic certificates are used to support strong authentication for devices and data confidentiality for data in transit or in storage. PKI capabilities are provided on demand for IoT services, such as devices registry, enrollment and authorization for communication.


Enhanced security

Protect devices and sensors without compromising performances with Horus Embedded Security for IoT. To enhance the integrity in IoT, the messages exchanged must be encrypted. Trust anchors can be implemented into existing electronic control units (ECUs) to perform the cryptographic functionality over standard interfaces.


What our clients say about us

Global security solution for the IoT LoRa ecosystem of Objenious

“Atos is a trusted partner and not just a security software company.” Philippe Cola, Core Network Senior Architect, Bouygues Telecom, Objenious.  Discover how Atos enabled Bouygues Telecom to become a global IoT vendor that offers clients peace of mind through end-to-end security.

Case Study

Related resources

Press Release

Atos releases the Horus security suite for Intelligent Transportation Systems

See how Atos can secure communications in connected vehicles.

White Paper

‘Things’ Matter: The New World of IoT Security

Discover how to Protect IoT deployment through 4 Steps: analytics, identity and lifecycle management, data security, and communications.


How to secure end-to-end IoT communication?

Discover how to secure your IoT communication, illustrated with a Bouygues Telecom use case (solution operated and commercialized by Objenious)


Become one of our partners

Achieve success with your customers through dedicated training and certification programs, as well as customized support to respond to clients’ needs.

Interested in our Digital Identities products?