The Trusted PKI service will be integrated with other Telefónica products such as CyberThreats
Telefónica cyber security unit, Eleven Paths, is collaborating with global cybersecurity firm Symantec to integrate the Symantec Managed Public Key Infrastructure (PKI) Service to protect Internet of Things (IoT) environments against cyber attacks.
In the IoT, millions of different devices are interconnected in an open digital environment and need to communicate securely to preserve the trustworthiness of the IoT applications. Identity and authentication is a cornerstone of building such trust so Telefónica is developing ways to securely and indisputably identify those devices and secure the data transmitted among them.
It is developing its Trusted PKI service and will use Symnatec’s Managed PKI Certificate Technology to ensure that the connected devices are what they claim to be and that code running on IoT devices is authorised.
The high-volume, high-performance managed certificate service Symantec offers will allow Telefónica to embed certificates on hardware or issue them in real time as required for their specific use case. These code-signing certificates and cloud-based signing-as-a-service will be part of Telefonica’s comprehensive offer for IoT environment.
With the new technology incorporated by Telefónica, companies that require large-scale IoT deployments will be able to manage certificates’ lifecycle for auto enrolment, renew and revoke the certificates to secure the communication and provide mutual identification, encrypt communications end-to-end and guarantee the integrity and traceability of the transactions.
Trusted PKI service is integrated with other IoT security solutions from Telefónica such as CyberThreats, which can detect and identify the modus operandi of the cyber criminals and the methods used in attacks against IoT infrastructure, and Faast IoT technology, specialised in detecting and analysing vulnerabilities in IoT ecosystems.
Telefónica and Symantec want their future collaboration to deliver on four key cornerstones that are drivers for the IoT and its security: the protection of communications, securing the identity and authentication of the IoT devices, the protection of devices themselves, including host-based protection and reputation based security, the management of the devices including OTA management, and the understanding of the IoT environment, through security analytics helping flag any anomaly.
If you like this, you might be interested in reading the following:
Cyber-security firm DarkMatter has launched what it claims is a first-of-its-kind citywide dashboard to predict and mitigate cyber threats
Companies take control of the Cyber Essentials certification process
By 2020, Gartner predicts that more than 25 percent of identified attacks in enterprises will involve IoT, although it will account for less than 10 percent of IT security budgets