Secure Network

Lockbox security policies protect every message, device & transaction

 

Security is considered the top challenge for most organizations as they look to gain value from connected solutions.

M2Mi’s patented Lockbox security is purpose built to address the scale and unique architectural requirements of the diverse M2M ecosystem. By ensuring that each access to a resource meets Lockbox security policies, the M2M Intelligence application protects each and every asset, device and transaction within the connected ecosystem.

Secure Network Features and Benefits

  • Enable timely security updates to sensors and devices +

    M2M Intelligence Security Services are integrated with device and connection management to easily connect to and update devices with the latest security and firmware updates. These can be setup for immediate group device actions or scheduled for a specific time
  • Enforce dynamic security policies to address changing context +

    The M2M and IoT environment is ever changing. M2M Intelligence Lockbox security policies are dynamic and based on the current context and state of the environment. For example, it can allow message transfer only if the connection is within a certain geography or using SSL. Security policies can also be customized based on company requirements.
  • Strict control of user access, roles and privileges +

    The M2M Intelligence application uses role based policies to enforce access, authority and role within the company's environment. M2M Intelligence can also integrate with an organization's current LDAP or IAM environment so that only authorized users and resources can access the device and the messages from it
  • M2M & IoT optimized encryption for performance and security +

    The scale, low power devices and distributed nature of an IoT environment requires powerful but lightweight encryption. The M2M Intelligence application uses standard TLS, HTTPS, SSL for transport security and strong, lightweight data encryption optimized for IoT scale and performance requirements.  This inclues the latest development built by M2Mi under a contract with the Department of Homeland Security providng an implementation of the SPECK lightweight block ciphers from the NSA's SIMON & SPECK family of hardware and software optimised ciphers aimed specifically at low and restricted resource IoT end devices.   
  • 1