What do we do?
We provide IoT security 'beyond the edge' to extend it to low complexity IoT sensors and endpoint devices
What problem do we solve?
Many IoT vendors and customers cannot add security to their low complexity IoT endpoints because of their limited processing power and battery capacity. Short of redesigning these endpoints and a
What do we do?
We provide IoT security 'beyond the edge' to extend it to low complexity IoT sensors and endpoint devices
What problem do we solve?
Many IoT vendors and customers cannot add security to their low complexity IoT endpoints because of their limited processing power and battery capacity. Short of redesigning these endpoints and adding new chips (which add to cost), these endpoints will stay unprotected. But if the IoT market is to reach its projected massive potential, the bulk of future IoT connected devices will have to be very low cost endpoints (i.e. with low compute power), operating autonomously on small batteries and connected wirelessly to the network ... and be secured.
This is BTW how we picked our name: "iota" for small (and also for IoT) and "BEAM" for wireless.
Existing "end-to-end" IoT security solutions or platforms stop at the gateways and do not secure such tiny endpoints. The data they capture however is becoming more and more vital in our daily lives, even in some cases life-critical, as they provide the foundation upon which AI or ML-based automated systems operate and make decisions.
Also, new security systems cannot be easily retrofitted into existing systems which have been designed and installed years ago, such as industrial ICS, PLC or RTU, which are using exotic non-IP protocols such as MQTT, Hart, Modbus, etc.
Our solution allow customers and IoT vendors to add endpoint security into their systems, or retrofit security into their existing systems, with no impact on their hardware design and infrastructure.
Boiling it in one sentence!
Customers who previously could not extend security to low complexity IoT endpoints can now do it with iotaBEAM, without a need for major redesign or change in their infrastructure
Is this problem a big deal?
Gartner estimates that there are over 20 billion IoT connected devices in use by now. Furthermore, IDC predicts that real time data collected by IoT devices will grow the fastest, and become increasingly more life critical and vital to all aspects of our daily life. By 2025, they predict that almost 90% of all
Is this problem a big deal?
Gartner estimates that there are over 20 billion IoT connected devices in use by now. Furthermore, IDC predicts that real time data collected by IoT devices will grow the fastest, and become increasingly more life critical and vital to all aspects of our daily life. By 2025, they predict that almost 90% of all data created around the world will need some level of security, but less than 50% will be secured.
While security remains the #1 concern and impediment in implementing IoT, no solution has been able to address the challenges of extending security to low complexity endpoints because of their highly constrained environment and low price point requirements.
How do we solve that problem?
We license and/or help implement our low footprint, non-hardware dependent technology to vendors and customers who want to add or reinforce security onto their systems, and extend it to their low complexity endpoints. Unlike conventional security solutions derived from the IT world that uses processing-heavy cryptography (e.g. AES) and battery-draining authentication protocols (e.g. SSL), iotaBEAM has developed a unique security solution from the ground up using the latest in cryptography, that takes a tiny footprint and is easy to implement on any endpoint CPUs or MCUs. To minimize power drain, unnecessary protocol chattiness has been reduced to a minimum. Each endpoint has its own set of security scheme, so no 2 endpoints are alike and the entire network cannot be compromised by a single breach. Data is encrypted and transmitted in a non-IP data stream that looks like random noise to outsiders, and thus hard to decipher. Encrypted data can be further transported as payload inside an IP packet and VPN tunneled in the Cloud for even more security. We not only agnostic to any IoT platform or processor, but also to any existing wireless access technologies (e.g. BLE, ZigBee, WiFi, LoRa, cellular IoT, etc.), IP topology and protection scheme (e.g. firewall), or LPWAN or Cloud infrastructure.
The security system is self-aware such that in an event of a hacking attempt, the hacking is immediately identifiable by the system. AI-based systems recognize emerging attacks, reverse out the hacker’s path, learn what the hacker is doing and learning – and then calculate a tactical response to stop him.
Our Leadership Team
Francois Le served as SVP and Corporate Officer at N.E.T. (acquired by Sonus). He held executive positions at AOptix, Tropos (acquired by ABB), Aperto (acquired by Tranzeo) and 3Com (acquired by HPE). He got his MBA from Stanford and Engineering Degree from INSA-Lyon in France.
Kevin Mullenex is a successful Silicon Va
Our Leadership Team
Francois Le served as SVP and Corporate Officer at N.E.T. (acquired by Sonus). He held executive positions at AOptix, Tropos (acquired by ABB), Aperto (acquired by Tranzeo) and 3Com (acquired by HPE). He got his MBA from Stanford and Engineering Degree from INSA-Lyon in France.
Kevin Mullenex is a successful Silicon Valley serial entrepreneur and business advisor. He founded Mi3 Security, which he grew and sold to Zimperium. Before that, he was an executive for Cyveillance, Solid Information Technology (now part of IBM), Sun Microsystems, 3Com and N.E.T. He got his MBA and MSEE from the University of Bridgeport.
Who is our competition?
Silicon vendors who have implemented "Root of Trust" security in their CPU, thus locking in customers to their architecture and implementation.
Large solution vendors who have implemented what they call "end-to-end" security in their portfolio of IoT products, which typically would not extend beyond their gateways.
Cloud vendors with their cloud service offerings that lock in customers into their centralized certificate servers.
Other start-ups addressing the same market than iotaBEAM but will just perform endpoint behavior monitoring or implement a silicon-based security approach.
What is our key differentiator?
Our motto is Keep It Simple and Secure
iotaBEAM is a simple and ingenious security solution, the only one in the market today that can be implemented in software with minimum effort and cost all the way to the low complexity sensors and endpoint devices, with no impact on the existing design or change in the infrastructure. The solution can also be implemented as a SaaS service over public Cloud networks.
iotaBEAM presentation on "Design Challenges on How to Secure Low Compute, Low Power IoT Sensors and Tiny Endpoint Devices", and the 5 Basic Design Rules to consider
With iotaBEAM's patented solution, IoT security can be extended beyond the LoRA gateways to reach the tiny sensors and endpoints capturing data, thus ensuring security all the way from the collection points to the data processing point
Copyright © 2023 iotaBEAM™ - All Rights Reserved.