New-Tech Europe Magazine | June 2018

devices from the production line until its end-of-life and from the embedded layer out to the cloud. Is there any change in attack vectors of IoT products?Or, with more connected devices, are there new threats emerging? There’s been a lot of buzz about the Meltdown and Spectre bugs that exposed vulnerabilities in billions of IoT devices. There’s been DDoS attacks that have come from unsecured IoT devices like security cameras. Right now, IoT devices are an easy gateway for hackers to infiltrate organizations’ security. What do you see as the major trends in IoT and connected devices? There’s a need to not only protect and secure devices, but also manage these connected devices. There will be a convergence of security and management for IoT devices and only then will these devices be truly secure. How do you see the cloud and IoT influencing each other? There is a need for the device side to trust commands and data coming from the cloud and for the cloud to trust information from the device side. It’s critical for the cloud to trust the device to avoid both vulnerabilities explotation as well as feeding the cloud with the wrong data. What are the challenges in securing IoT devices in today’s market? There’s no one solution and many vendors are sacrificing the device’s performance for security.

As vendors introduce embedded IoT security, they add latency and power consumption. What’s needed is a lightweight, unbreakable solution and that’s what NanoLock is providing to the market. Howis your approach to securing IoT devices different from other solutions on the market? NanoLock provides a holistic approach to securing IoT devices. Our security solution provides comprehensive lightweight, unbreakable security and management purpose-built for the Internet of Things (IoT) and Connected Devices ecosystem. Our company’s low-cost layered offering delivers a combination of cyber and cyber-physical protection, securing devices from the embedded layer out to the cloud. Why is your technology platform different? Explain the tenets of your solution. NanoLock’s Security platform protects the device’s entire

lifecycle from provisioning through operations and firmware updates, and even after the device’s end- of-life. Specially, NanoLock’s three-pronged approach prevents overwriting, modification, manipulation erasure and attacks on firmware, boot image, applications, executable and configuration in all connected and IoT devices and has a software platform to manage security and updates. What industries will benefit most from deploying NanoLock’s security platform? NanoLock’s technology was developed specifically for cloud providers, operators and OEMs. The platform is currently being piloted by several large customers in the U.S., Japan, Korea and Europe in a range of applications, such as automotive and connected cars, smart meters, and ICs and routers. Why will your company succeed? We have an experienced executive

picture: The NanoLock Security Team, in the middle Erez Kreiner Former Head of Israel’s’ Cyber Security Authority.

18 l New-Tech Magazine Europe

Made with FlippingBook - professional solution for displaying marketing and sales documents online