What do we do?
We provide IoT security 'beyond the edge' to extend it to low complexity IoT sensors and endpoint devices
What problem do we solve?
Many IoT vendors and customers cannot add security to their low complexity IoT endpoints because of their limited processing power and battery capacity. Short of redesigning these endpoints and adding new chips (which add to cost), these endpoints will stay unprotected. But if the IoT market is to reach its projected massive potential, the bulk of future IoT connected devices will have to be very affordable endpoints (i.e. with low compute power), operating autonomously on small batteries and connected wirelessly to the network ... and be secured.
This is BTW how we picked our iotaBEAM name: "iota" for small (and also for IoT) and "BEAM" for wireless.
Existing "end-to-end" IoT security solutions or platforms stop at the gateways and do not secure such endpoints. The data they capture however will become more and more vital in our daily lives, even in some cases life-critical, as they provide the foundation upon which AI or ML-based IoT systems operate and make decisions.
Our StarDust™ solution allow customers and IoT vendors to add endpoint security into their systems, or retrofit security into their existing systems, with no impact on their hardware design and infrastructure.
Boiling it in one sentence!
Customers who previously could not extend security to low complexity IoT endpoints can now do it with StarDust™, without a need for major redesign or change in their infrastructure
Is this problem a big deal?
Gartner estimates that there will be 20.4 billion IoT connected devices in use by 2020, Furthermore, IDC predicts that real time data collected by IoT devices will grow the fastest, and become increasingly more life critical and vital to all aspects of our daily life. By 2025, they predict that almost 90% of all data created around the world will need some level of security, but less than 50% will be secured.
While security remains the #1 concern and impediment in implementing IoT, no solution has been able to address the challenge of extending security to low complexity endpoints because of their highly constrained environment and low price point requirement.
How do we solve that problem?
We license our low footprint, non-hardware dependent StarDust™ technology to vendors and customers who want to add or reinforce security onto their systems, and extend it to their low complexity endpoints. Unlike conventional security solutions derived from the IT world that uses processing-heavy cryptography (e.g. AES) and battery-draining authentication protocols (e.g. SSL), iotaBEAM has developed a unique security solution from the ground up using the latest in cryptography, that takes a tiny footprint and is easy to implement on any endpoint CPUs or MCUs. To minimize power drain, protocol chattiness has been reduced to a minimum. Each endpoint has its own, unpublished set of keys, so no 2 endpoints are alike and the entire network cannot be compromised by a single breach. Data is encrypted and transmitted in a non-IP, unformatted bit stream, unique and hard to decipher. Encrypted data can be further transported as payload inside an IP packet and within a VPN tunnel in the Cloud if more security is required. StarDust™ is not only agnostic to any IoT platform or processor, but also to any existing wireless access technologies (e.g. BLE, ZigBee, WiFi, LoRa, cellular IoT, etc.), IP topology and protection scheme (e.g. firewall) or cloud service infrastructure.
Our Leadership Team
Francois Le served as SVP and Corporate Officer at N.E.T. (acquired by Sonus). He held executive positions at AOptix, Tropos (acquired by ABB), Aperto (Acquired by Tranzeo) and 3Com (acquired by HPE). He got his MBA from Stanford and Engineering Degree from INSA-Lyon in France.
The 2 inventors behind iotaBEAM's technology have previously co-founded JetCell, a pioneer in GSM+IP pico-cell systems, acquired by Cisco for $200M. One of them was named at the prestigious position of Cisco Fellow after the acquisition. They subsequently co-founded 2 other startups and hold more than 70 patents among the 2 of them.
Who is our competition?
Silicon vendors who have implemented security "Root of Trust" in their CPU, thus locking in customers to their architecture and implementation.
NB-IoT or LTE-M cellular operators offering IoT services which require SIM hardware for security.
Large solution vendors who have implemented "end-to-end" security in their portfolio of IoT products, which typically would not extend encryption to endpoints and would just monitor their behavior.
Cloud vendors with their cloud service offerings that lock in customers into their centralized certificate servers.
Other start-ups addressing the same market than iotaBEAM but with a silicon-based approach.
What is our key differentiator?
Our motto is KISS: Keep It Simple and Secure
iotaBEAM is a simple and ingenious security solution, the only one in the market today that can be implemented in software with minimum effort and cost all the way to the low complexity sensors and endpoint devices, with no impact on the existing design or change in the infrastructure
Check iotaBEAM's virtual presentation at IoT Live Slam 2018 in RTP, June 21 2018 and learn about our 5 Basic Design Rules to design or select the right security solution for low power, low complexity IoT sensors and endpoint devices.
California is poised to enact 1st State Law directed at securing IoT devices
IoT Security: a Doomsday Scenario Waiting to Unfold
Hackers are Attacking Power Companies, Stealing Critical Data
Microsoft (finally) in Motion to Secure Billions of Connected Devices
Criminals Hacked a Fish Tank to Steal Data from a Casino
Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid