Lockbox

Enable secure sharing, multi-level privacy and control data access

 

The M2M & IoT ecosystem is a very diverse one – device manufacturers, telecoms, cloud providers, enterprises are just a few among them. Privacy becomes important when the data is being shared among the various constituents.

M2Mi's patented Lockbox security (US Patent 7,376,652) ensures multi-level privacy as well as controls each and every access to data thus ensuring data provenance, secure sharing with governance and compliance.

Lockbox Features and Benefits

  • Enable multi-level privacy across the IoT ecosystem +

    Any M2M and IoT solution includes a large and diverse set of ecosystem participants. Therefore enforcing privacy while sharing data and access is a critical requirements. M2M Intelligence Lockbox policies enable multiple participants to access and share data using Lockbox keys. This process allows for anonymous, authenticated and encrypted sharing, thus enabling organizations to enforce their privacy policies.
  • Manage every facet of access for control over data +

    Data is the most important asset in the IoT ecosystem. Lockbox policies enable an organization to control and track this asset, throughout the environment. A Lockbox key is required to access any resource or data element and thus it can be used to control user, application, API access at a very granular level.
  • Data provenance from source through ecosystem to ensure trust +

    Data Provenance allows you to understand the access history of your data – with Lockbox policies you can know each and every device, user, network, API and application that touch or modify data from the source and its movement through the ecosystem. Knowing this provenance can ensure trust in the data.
  • Audit trail for every data touch point for governance and compliance +

    Lockbox access policies enables you to track, and audit the history of data access from data creation through every touch point and access throughout the M2M and IoT ecosystem. This data and reporting enables and organization to comply with regulations and build a strong GRC framework
  • Secure sharing of data within the value chain +

    Share data securely among diverse participants in the M2M & IoT value chain. With Lockbox policies, access can be granted to data to enable secure sharing – this can be via API access to applications, users, MQTT brokers or authorized resources.
  • 1