Horus HSM for IoT
What are the steps to secure IoT ecosystems?
With digital transformation, manufacturers, network providers and IoT services owners can strengthen the relationship they have with the end users of their solutions. To reinforce the trust between them, it becomes prevalent to be prepared for any potential cyberattack that could compromise sensitive data.
► How to securely manage connected devices during their whole lifecycle?
► How to ensure a secure communication exchange in the IoT network?
► How to protect data from end-to-end?
With the Horus HSM for IoT, based on our crypt2pay product, Atos provides a highly secured solution dedicated for IoT which enables organizations to be compliant with the most stringent regulations and to ensure data protection in this evolving landscape.
Secure your connected devices communications
To follow or contact us:
In which applications can the Horus HSM for IoT be applied?
The Horus HSM for IoT can typically be operated within organizations for:
► Securing key generation and key injection within connected devices
► Ensuring data trust by verifying the integrity of the payload and managing the trusted nodes lifecycle with a scalable solution
► Ensuring data integrity through encryption and decryption, enabling compliance with the most stringent security regulations and privacy requirements
It can be used by manufacturers (Internet of Things devices), network providers and utilities (Gas and water meters, Electronic meters…).More info on how we secure smart meters
What our clients say about us
Global security solution for the IoT LoRa ecosystem of Objenious
“Atos is a trusted partner and not just a security software company.” Philippe Cola, Core Network Senior Architect, Bouygues Telecom, Ojenious. Discover how Atos enabled Bouygues Telecom to become a global IoT vendor that offers clients peace of mind through end-to-end security.Case Study
How we can help you deliver state-of-the-art security to IoT
The Horus HSM for IoT is available for applications running in SaaS mode (software-as-a-service) and enables several tenants to benefit from ultimate encryption as if they had their own dedicated HSM. Indeed, the HSM solution is divided into several ‘security domains’ which can be personalized by each tenant, and act as tamper-proof strongboxes with high levels of isolation between tenants, users and roles. The security teams can remotely manage HSMs without any physical access – which simplifies security management and saves time.
Centralized Key Management
To securely manage IoT devices, each connected object must be given a trusted identity through the provision of secure cryptographic keys via HSMs. The Horus HSM for IoT provides a Key Management Center which reduces the number and complexity of operations for security officers, while ensuring consistency in key distribution for multi-sites deployment contexts.
Support of IoT security services and protocols
The Horus HSM for IoT offers embedded IoT security services, such as the authentication of communicating devices and the processing and confidentiality of data transmitted. These services are specific to each industry sector and follow the latest IoT security protocols, such as: LoRAWAN 1.0/1.1 for telecommunications, DLMS/COSEM for Utilities and smart meters, LWM2M/OSCORE for machine to machine communications and device management in industrial IoT.
See how Atos can secure communications in connected vehicles.
Discover how to Protect IoT deployment through 4 Steps: analytics, identity and lifecycle management, data security, and communications.
Discover how to secure your IoT communication, illustrated with a Bouygues Telecom use case (solution operated and commercialized by Objenious)