PR Archives:  LatestBy Company By Date

Press Release -- September 20th, 2017
Source: Ericsson

Five to watch: E2E security and identity for IoT

There is still a lot of concern about security and privacy, especially within mission-critical industries. As cybersecurity threats continue to increase it’s more essential than ever to take a comprehensive approach to IoT security.

As we continue our series examining the trends that are shaping the future of network platforms, we turn our attention now to security and identity for the IoT.

In his recent article for Ericsson Review, Ericsson’s CTO, Erik Ekudden, explains that security and privacy are not things that can be added on; they must be fully integrated into domains and components, processes, storage and communication. This comprehensive approach will be based on an industry-wide agreement on how to secure trust in development, deployment and operations.

Ericsson has extensive experience in delivering secure IoT solutions for businesses, for example through its Data Centric Security solution which uses advanced blockchain technology to detect attacks in near-real time. Identity and access management is another complex area and Ericsson’s portfolio in this area contains solutions such as Authentication Federation Gateway (AFG), Certificate Administration Server (ECAS), Mobile Digital Identity (MDI) and Identity & Access Management (IAM).

Want to delve deeper into the challenges surrounding IoT security and identity? Read more in our White Paper about how to secure the Internet of Things.

PR Archives: Latest, By Company, By Date