Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Trusted Identities for Devices and Individuals

Build a trusted ecosystem for your digital identity security

Trustway HSM for IoT

What are the steps to secure IoT ecosystems?

With digital transformation, manufacturers, network providers and IoT services owners can strengthen the relationship they have with the end users of their solutions. To reinforce the trust between them, it becomes prevalent to be prepared for any potential cyberattack that could compromise sensitive data.

How to securely manage connected devices during their whole lifecycle?
How to ensure a secure communication exchange in the IoT network?
How to protect data from end-to-end?

With the HSM for IoT, based on our Trustway crypt2pay product, Atos provides a highly secured solution dedicated for IoT which enables organizations to be compliant with the most stringent regulations and to ensure data protection in this evolving landscape.

Horus HSM for IoT - Secure IoT ecosystems

Secure your connected devices communications

To follow or contact us:
Linkedin | Twitter

Watch our webinar on IoT communication security

In which applications can the HSM for IoT be applied?

Horus HSM for IoT Dedicated functionalities to secure IoT ecosystems

The Trustway HSM for IoT can typically be operated within organizations for:

Securing key generation and key injection within connected devices
Ensuring data trust by verifying the integrity of the payload and managing the trusted nodes lifecycle with a scalable solution
Ensuring data integrity through encryption and decryption, enabling compliance with the most stringent security regulations and privacy requirements

It can be used by manufacturers (Internet of Things devices), network providers and utilities (Gas and water meters, Electronic meters…).

More info on how we secure smart meters

What our clients say about us

Global security solution for the IoT LoRa ecosystem of Objenious

“Atos is a trusted partner and not just a security software company.” Philippe Cola, Core Network Senior Architect, Bouygues Telecom, Ojenious. Discover how Atos enabled Bouygues Telecom to become a global IoT vendor that offers clients peace of mind through end-to-end security.

Case Study

How we can help you deliver state-of-the-art security to IoT

Flexibility

The Trustway HSM for IoT is available for applications running in SaaS mode (software-as-a-service) and enables several tenants to benefit from ultimate encryption as if they had their own dedicated HSM. Indeed, the HSM solution is divided into several ‘security domains’ which can be personalized by each tenant, and act as tamper-proof strongboxes with high levels of isolation between tenants, users and roles. The security teams can remotely manage HSMs without any physical access – which simplifies security management and saves time.

Centralized Key Management

To securely manage IoT devices, each connected object must be given a trusted identity through the provision of secure cryptographic keys via HSMs. The Trustway HSM for IoT provides a Key Management Center which reduces the number and complexity of operations for security officers, while ensuring consistency in key distribution for multi-sites deployment contexts.

Support of IoT security services and protocols

The Trustway HSM for IoT offers embedded IoT security services, such as the authentication of communicating devices and the processing and confidentiality of data transmitted. These services are specific to each industry sector and follow the latest IoT security protocols, such as: LoRAWAN 1.0/1.1 for telecommunications, DLMS/COSEM for Utilities and smart meters, LWM2M/OSCORE for machine to machine communications and device management in industrial IoT.

Related resources

Atos cybersecurity IoT security 4 steps

White Paper

‘Things’ Matter: The New World of IoT Security

Discover how to Protect IoT deployment through 4 Steps: analytics, identity and lifecycle management, data security, and communications.

Webinar

How to secure end-to-end IoT communication?

Discover how to secure your IoT communication, illustrated with a Bouygues Telecom use case (solution operated and commercialized by Objenious)

Interested in our HSM for IoT?