The security considerations of connected devices and their relationship with the cloud

Nicolas Devillard, Senior Product Manager ,Arm The security considerations of connected devices and their relationship with the cloud The Internet of Things opens new doors for connected devices, including a new world of the Industrial Internet of Things (IIoT). The future of IIoT hangs on authenticity, confidentiality and integrity, enabling high quality data which can inform operational and energy efficiencies, plus the reduction of costs to the bottom line. In order to make sensible data-based decisions, you need to have complete trust that the IoT deployment is working correctly, has not been tampered with and that the received data has not been modified in transit. As IIoT devices will have long lifecycles, with multiple stakeholders, you also need to ensure that everyone in the value chain, has correct read/write access, reflecting their trusted status. Some of these security-based decisions can seem complex and difficult to tackle, but with proven technology, scalable solutions, and a broad ecosystem, security implementation is more accessible to industrial companies than ever before. This session explored how to define security requirements, plus the various approaches you can take for securing your devices, your data and your business. You will learn about the need for security in industrial IoT; how this translates into device and data security and how Arm makes this achievable

Subscribe to the CW newsletter

This site uses cookies.

We use cookies to help us to improve our site and they enable us to deliver the best possible service and customer experience. By clicking accept or continuing to use this site you are agreeing to our cookies policy. Learn more

Start typing and press enter or the magnifying glass to search