How can you guarantee the security of your IoT data?
Protect your data with Atos’s IoT Security Server solution
Secure identity management is at the core of security in the digital world. The growing number of connected devices in the Internet of Things (IoT) results in increasingly complex system interactions that must be managed.
The Atos IoT Security Server safeguards connected objects, their communications and the exchanged data, providing a secure, compliant and scalable solution to face these new challenges. We support your enterprise in your digital journey, allowing you to focus on growing your IoT business.
The IoT Security Server provides functionality for the entire gamut of IoT device security management, which is critical to control the lifecycle of your devices and networks.
Manufacturers can rely on our solution to securely distribute device keys or certificates while the inner database mechanisms are coupled with Atos HSM products, making it easy to securely store device-related information. This information is vital to provide full protection of data at rest, and to guarantee secure device communications.
Scalability and performance
As the number of connected devices is expected to reach tens of billions, our solution is designed to be highly scalable, with multiple active instances within a possible redundant architecture to handle major growth in the future.
Flexible deployment
The IoT Security Server can be deployed on-premises or in SaaS mode to be operated as part of an MSSP SOC, or it may be hosted in secure data centers managed by Atos.
Supporting growth
The modular design of Atos IoT Security Server enables smooth deployment of a solution tailored to your organization’s needs. It can also be integrated with different partners to build a complete end-to-end IoT security solution.
Specifications
Supported profiles
Telecom (LoRa)
- Network service (Join/Rejoin, VeryMIC Requests)
- Applicative service (GetAppSKey Requests)
- Device management (enrollment, lifecycle management, manufacturer management)
Utilities (Smart Meters)
- Smart meter device management
- Manufacturer management
- Key exchanges
- Message encryption/decryption
- Provider management
- Logistics flow
Markets and standards
- LoRaWAN v1.0 and v1.1
- DLMS/COSEM (IEC 62056)
- Car2Car Communication Consortium (C-ITS)
Environment
Hosting hardware and software
- Physical Servers: 32/64 bit platform with at least 4 Gb of RAM, 10 Gb of available disk memory, 2 Ethernet ports
- Virtual Machines: VMWare or HyperV
- Operating System: Red Hat 6 or 7 (32 or 64 bits) / SUSE SLES 10 or 11 (32 or 64 bits)
- Database: Cassandra or PostgreSQL (external base in 3 tiers architecture)
Workstations for administrators
- Browser: Internet Explorer 8 version and later, Firefox or Chrome
- Operating System: Windows XP (Service Pack 3) / Windows 7 / Windows 8 / Windows 10
- HSM: HSM with IoT dedicated functions: Trustway Crypt2pay with IoT extensions
Related resources
Security Server factsheet
Manage more and more complex system interactions while securing connected objects, communications and data exchanges.
Expert advice
A centralized security infrastructure for the IoT
Vincent Kahoul offers an alternative model using a centralized security infrastructure able to deliver and inject digital identities in IoT devices such as electronic certificates and keys.