Horus – Trusted Identities for Devices and Individuals

Build a trusted ecosystem for your digital identity security

Horus HSM for IoT

What are the steps to secure IoT ecosystems?

With digital transformation, manufacturers, network providers and IoT services owners can strengthen the relationship they have with the end users of their solutions. To reinforce the trust between them, it becomes prevalent to be prepared for any potential cyberattack that could compromise sensitive data.

 How to securely manage connected devices during their whole lifecycle?
 How to ensure a secure communication exchange in the IoT network?
 How to protect data from end-to-end?

With the Horus HSM for IoT, based on our crypt2pay product, Atos provides a highly secured solution dedicated for IoT which enables organizations to be compliant with the most stringent regulations and to ensure data protection in this evolving landscape.

Atos will be present at the IoT World 2020, 18-19 March, Paris, France.

Horus HSM for IoT - Secure IoT ecosystems

Secure your connected devices communications

To follow or contact us:
Linkedin | Twitter

Watch our webinar on IoT communication security

In which applications can the Horus HSM for IoT be applied?

Horus HSM for IoT Dedicated functionalities to secure IoT ecosystems

The Horus HSM for IoT can typically be operated within organizations for:

 Securing key generation and key injection within connected devices
 Ensuring data trust by verifying the integrity of the payload and managing the trusted nodes lifecycle with a scalable solution
 Ensuring data integrity through encryption and decryption, enabling compliance with the most stringent security regulations and privacy requirements

It can be used by manufacturers (Internet of Things devices), network providers and utilities (Gas and water meters, Electronic meters…).

More info on how we secure smart meters

What our clients say about us

Global security solution for the IoT LoRa ecosystem of Objenious

“Atos is a trusted partner and not just a security software company.” Philippe Cola, Core Network Senior Architect, Bouygues Telecom, Ojenious.  Discover how Atos enabled Bouygues Telecom to become a global IoT vendor that offers clients peace of mind through end-to-end security.

Case Study

How we can help you deliver state-of-the-art security to IoT

Flexibility

The Horus HSM for IoT is available for applications running in SaaS mode (software-as-a-service) and enables several tenants to benefit from ultimate encryption as if they had their own dedicated HSM. Indeed, the HSM solution is divided into several ‘security domains’ which can be personalized by each tenant, and act as tamper-proof strongboxes with high levels of isolation between tenants, users and roles. The security teams can remotely manage HSMs without any physical access – which simplifies security management and saves time.

Centralized Key Management

To securely manage IoT devices, each connected object must be given a trusted identity through the provision of secure cryptographic keys via HSMs. The Horus HSM for IoT provides a Key Management Center which reduces the number and complexity of operations for security officers, while ensuring consistency in key distribution for multi-sites deployment contexts.

Support of IoT security services and protocols

The Horus HSM for IoT offers embedded IoT security services, such as the authentication of communicating devices and the processing and confidentiality of data transmitted. These services are specific to each industry sector and follow the latest IoT security protocols, such as: LoRAWAN 1.0/1.1 for telecommunications, DLMS/COSEM for Utilities and smart meters, LWM2M/OSCORE for machine to machine communications and device management in industrial IoT.

Related resources

Press Release

Atos releases the Horus security suite for Intelligent Transportation Systems

See how Atos can secure communications in connected vehicles.

White Paper

‘Things’ Matter: The New World of IoT Security

Discover how to Protect IoT deployment through 4 Steps: analytics, identity and lifecycle management, data security, and communications.

Webinar

How to secure end-to-end IoT communication?

Discover how to secure your IoT communication, illustrated with a Bouygues Telecom use case (solution operated and commercialized by Objenious)

Partnership

Become one of our partners

Achieve success with your customers through dedicated training and certification programs, as well as customized support to respond to clients’ needs.

Interested in our Digital Identities products?