IoT Security-as-a-Service

Protect your business-critical data from device to cloud with u-blox IoT Security-as-a-Service

Quick facts

We provide IoT Security-as-a-Service

u-blox's innovative IoT security solution makes it extremely simple to protect your data, both on the device and during the transmission of data from the device to the cloud. This ensures that you can focus on your business and enjoy faster time-to-market.

We implement a true end-to-end concept where data is protected from the device to the end-user and is not visible by the intermediate nodes/platforms nor by the service provider.

Find out how u-blox certificate lifecycle control (CLC)can help you keep your IoT network secure without all the hassle.

Watch the prerecorded webinar here:

Our experts are here to answer your questions on u-blox IoT Security-as-a-Service. Fill out the form attached to this button and we’ll be in touch as soon as possible:

Our approach ensures minimal code development and investment and the highest standards of security, leveraging the Root of Trust in R4,  R5, and R6 module platforms to bring a unique and immutable identity for a univocal identification and on-boarding in the leading IoT cloud platforms.

The innovative symmetric key management system delivers an unprecedented level of IoT security giving the possibility to generate on-the-fly an infinite number of crypto keys different for each device to be used for (D)TLS or for any other purpose.

All u-blox IoT security solutions are accurately designed for LPWA constrained devices, reducing the data usage and number of flights, thus minimizing the power consumption that is a critical metric for most IoT devices.

See the u-blox services overview to learn more about all u-blox service areas.

u-blox services are delivered by the Thingstream IoT service delivery platform.

Contact Thingstream support

digital certificate management

Easily onboard your device in cloud platforms

Out-of-the-box on-boarding to IoT cloud platforms with total control of the device certificate lifecycle

  • Device onboarding to IoT cloud platforms, based on X.509 certificates
  • Remote deployment of device and root certificates into the device with zero touch provisioning
  • Renewal of credentials in a fully automatic mode to ensure future-proof protection
  • Designed and optimized to seamlessly scale from prototyping to huge fleets
Find out more about certificate lifecycle control

remote camera

Trust and control your device

Unique and immutable device identity and robust root of trust are the foundation of IoT Security.

  • TEE (R4 platform) and HW (R5 platform) root of trust
  • Secure production
  • Secure boot
  • Anticloning detection & rejection
  • Secure updates
  • Secure communications via (D)TLS 1.2 protocol stack
Find out more about foundation security

fingerprint

Protect critical data on device

Guard sensitive information on your device without the need for a specialized trusted chip.

  • Protect data via Authenticated Encryption with Associated Data (AEAD) and AES encryption and store information even in a non-secure location
  • Defend data at rest against theft, tampering, or injection
  • Secure the communication between modem and microcontroller with AES encrypted messages
  • Save space and simplify the design of your device
Find out more about design security

car factory with robots

Protect critical data between device and cloud

Ensure the real end-to-end privacy, integrity, and authenticity of your data in transit

 

  • Securely transfer data between device and cloud/end user without writing any security code or using additional hardware
  • Leverage the u-box symmetric Key Management System to generate infinite number of cryptographic keys for secure sessions
  • Protect data with AEAD and AES encryption and reduce overhead by up to 8X on (D)TLS sessions
  • Reduce power consumption and handshakes by entirely removing the need for certificates
  • Keep the full control of cryptographic keys without the need for a PKI or PSK infrastructure 

 

Find out more about end-to-end security

IoT Security-as-a-Service use cases

Asset tracking

For asset tracking, data authenticity is essential, as well as the secure local storage of collected data and an easy secure cloud onboarding. Since the device is usually battery operated, it is mandatory to use an efficient way to transmit data securely to the cloud, reducing the power consumed.

Connected health

Connected health requires confidentiality and authenticity to ensure that only the patient and the healthcare provider (or the doctor) can access sensitive data. Software and data tampering pose a huge risk for patient safety.

Industrial monitoring

Industrial monitoring applications require the capability to monitor both the working status of a machine and the real-time condition of the production line. To intervene properly before  machine downtime occurs and to make real-time decisions, it is mandatory to always trust the data reported by the sensor to the cloud application, providing a reliable way to ensure the integrity and authenticity of the data.

Smart building and smart home

Smart building and smart home networks shall guarantee the confidentiality and authenticity of the data to protect customer privacy and securely transfer personal data. Additionally, it is crucial to securely share collected data across trusted stakeholders and the secure authentication of the devices to the cloud.

Telematics

Telematics IoT devices must ensure 24/7 availability of business operations as well as authenticity of devices. It is also mandatory to protect the safety of personnel and fleet through accurate and protected data. The main risks to address are denial of service, cloning of devices, jamming, and data thefts.

Metering

Metering applications want to protect billing revenues by ensuring the authenticity and integrity of end-user data; securely remote-control meters for safety and billing purposes, and establish trusted communication to transmits data securely and only to authorized servers.

u-blox services are delivered by the Thingstream IoT service delivery platform.

Contact Thingstream support

 

CES award for SARA-R5

 

GSMA banner