IoT Security Server

Data protection to meet the security challenges of the Internet of Things

How can you guarantee the security of your IoT data?

Protect your data with Atos’s IoT Security Server solution

Secure identity management is at the core of security in the digital world. The growing number of connected devices in the Internet of Things (IoT) results in increasingly complex system interactions that must be managed.

The Atos IoT Security Server safeguards connected objects, their communications and the exchanged data, providing a secure, compliant and scalable solution to face these new challenges. We support your enterprise in your digital journey, allowing you to focus on growing your IoT business.

The IoT Security Server provides functionality for the entire gamut of IoT device security management, which is critical to control the lifecycle of your devices and networks.

Manufacturers can rely on our solution to securely distribute device keys or certificates while the inner database mechanisms are coupled with Atos HSM products, making it easy to securely store device-related information. This information is vital to provide full protection of data at rest, and to guarantee secure device communications.

Atos cybersecurity IoT security Security server

Scalability and performance

As the number of connected devices is expected to reach tens of billions, our solution is designed to be highly scalable, with multiple active instances within a possible redundant architecture to handle major growth in the future.

Flexible deployment

The IoT Security Server can be deployed on-premises or in SaaS mode to be operated as part of an MSSP SOC, or it may be hosted in secure data centers managed by Atos.

Supporting growth

The modular design of Atos IoT Security Server enables smooth deployment of a solution tailored to your organization’s needs. It can also be integrated with different partners to build a complete end-to-end IoT security solution.


Supported profiles

Telecom (LoRa)

  • Network service (Join/Rejoin, VeryMIC Requests)
  • Applicative service (GetAppSKey Requests)
  • Device management (enrollment, lifecycle management, manufacturer management)

Utilities (Smart Meters)

  • Smart meter device management
  • Manufacturer management
  • Key exchanges
  • Message encryption/decryption
  • Provider management
  • Logistics flow
Markets and standards
  • LoRaWAN v1.0 and v1.1
  • DLMS/COSEM (IEC 62056)
  • Car2Car Communication Consortium (C-ITS)

Hosting hardware and software

  • Physical Servers: 32/64 bit platform with at least 4 Gb of RAM, 10 Gb of available disk memory, 2 Ethernet ports
  • Virtual Machines: VMWare or HyperV
  • Operating System: Red Hat 6 or 7 (32 or 64 bits) / SUSE SLES 10 or 11 (32 or 64 bits)
  • Database: Cassandra or PostgreSQL (external base in 3 tiers architecture)

Workstations for administrators

  • Browser: Internet Explorer 8 version and later, Firefox or Chrome
  • Operating System: Windows XP (Service Pack 3) / Windows 7 / Windows 8 / Windows 10
  • HSM: HSM with IoT dedicated functions: Trustway Crypt2pay with IoT extensions

Related resources

Atos cybersecurite Security Server en

Security Server factsheet

Securing the value of the IoT

Manage more and more complex system interactions while securing connected objects, communications and data exchanges.

Atos cybersecurite IoT expert advice

Expert advice

A centralized security infrastructure for the IoT

Vincent Kahoul offers an alternative model using a centralized security infrastructure able to deliver and inject digital identities in IoT devices such as electronic certificates and keys.

Other IoT security products

CardOS for IoT

Secure authentication & trusted identity delivering assurance and efficiency to IoT.
Visit product page >

PKI for IoT

Complete solution for the creation & lifecycle management of digital certificates for IoT.
Visit product page >
Trusted Blockchain - Blockchain security

Trusted Blockchain

Decentralized management of multi-actor confidence.
Visit product page >

Interested in our IoT Security Server?