SecuriThings is a fully managed IoT security solution that monitors the ever-so-vulnerable cloud-connected IoT devices.

Think about a smart city deployment like we have here in Tel Aviv.

This makes traditional security mechanisms like perimeter firewall,web connection traffic analysis and intrusion detection no longer valid.

Securing IoT Devices with SecuriThings — VP Yotam Gutman

Today we need to secure every gear on its own.

Most installations either ignore that at the beginning, or they are content with very basic encryption and authentication.

You cannot interfere with the gear activity.

Article image

We are collecting data in real time from the devices and processing it on the cloud layer.

How Does SecuriThings Work?

There are hundreds of dedicated cloud platforms for IoT, including Azure, Amazon, Google and others.

Article image

There we do the big heavy machine learning process.

If that doesnt work, they venture to brute force using password guessing.

A gear under attack is accessed thousands of time a day, which means it is constantly working.

Article image

Who are your typical clients?

Currently, the entities that are in charge of securing these devices are the IoT service providers and integrators.

Our architecture enables us to deliver the technology as a managed service.

Article image

Our end clients are municipalities and individuals with devices in their homes.

enterprises using remote surveillance services).

What would it take to operate a smart city securely?

Article image

Smart cities are comprised of multiple smaller projects.

Usually they have sensors collecting data and building applications based on that data.

We work with the integrators to ensure the installation is secure.

The level of security is reflected in the management of the entire deployment.

Here in Tel Aviv , there are multiple city-wide IoT projects.

Data from these devices is constantly being collected and brought to a main room.

If this data is not protected.

If not properly secured, a smart city can easily become a target for terror attacks.

They would simply clog up the roads.

The potential for obstruction is greater than we’ve ever seen before.

Looking back, let’s compare IoT security with traditional IT security.

IT security started with personal computers.

Even in the late 80’s we already had viruses, but they were nothing more than a nuisance.

Next, cloud technology and mobile devices came along, introducing another set of risks.

All of that took nearly 30 years to evolve.

There’s a big push for adoption, but security is still lagging.

A cheap gear that costs $5.00 cannot deploy an antivirus license that costs $20 per year.

c’mon, comment on how to improve this article.