What do we do?
We provide IoT security 'beyond the edge' to extend it to low complexity IoT sensors and endpoint devices
What problem do we solve?
Many IoT vendors and customers cannot add security to their low complexity IoT endpoints because of their limited processing power and battery capacity. Short of redesigning these endpoints and adding new chips (which add to cost), these endpoints will stay unprotected. But if the IoT market is to reach its projected massive potential, the bulk of future IoT connected devices will have to be very affordable endpoints (i.e. with low compute power), operating autonomously on small batteries and connected wirelessly to the network ... and be secured.
This is BTW how we picked our iotaBEAM name: "iota" for small (and also for IoT) and "BEAM" for wireless.
Existing "end-to-end" IoT security solutions or platforms stop at the gateways and do not secure such tiny endpoints. The data they capture however will become more and more vital in our daily lives, even in some cases life-critical, as they provide the foundation upon which AI or ML-based automated systems operate and make decisions.
Our StarDust™ solution allow customers and IoT vendors to add endpoint security into their systems, or retrofit security into their existing systems, with no impact on their hardware design and infrastructure.
Boiling it in one sentence!
Customers who previously could not extend security to low complexity IoT endpoints can now do it with StarDust™, without a need for major redesign or change in their infrastructure
Is this problem a big deal?
Gartner estimates that there will be 20.4 billion IoT connected devices in use by 2020, Furthermore, IDC predicts that real time data collected by IoT devices will grow the fastest, and become increasingly more life critical and vital to all aspects of our daily life. By 2025, they predict that almost 90% of all data created around the world will need some level of security, but less than 50% will be secured.
While security remains the #1 concern and impediment in implementing IoT, no solution has been able to address the challenges of extending security to low complexity endpoints because of their highly constrained environment and low price point requirements.
How do we solve that problem?
We license our low footprint, non-hardware dependent StarDust™ technology to vendors and customers who want to add or reinforce security onto their systems, and extend it to their low complexity endpoints. Unlike conventional security solutions derived from the IT world that uses processing-heavy cryptography (e.g. AES) and battery-draining authentication protocols (e.g. SSL), iotaBEAM has developed a unique security solution from the ground up using the latest in cryptography, that takes a tiny footprint and is easy to implement on any endpoint CPUs or MCUs. To minimize power drain, protocol chattiness has been reduced to a minimum. Each endpoint has its own, unpublished set of keys, so no 2 endpoints are alike and the entire network cannot be compromised by a single breach. Data is encrypted and transmitted in a non-IP data stream that looks like random noise to outsiders, and thus hard to decipher. Encrypted data can be further transported as payload inside an IP packet and VPN tunnel in the Cloud if more security is required. StarDust™ is not only agnostic to any IoT platform or processor, but also to any existing wireless access technologies (e.g. BLE, ZigBee, WiFi, LoRa, cellular IoT, etc.), IP topology and protection scheme (e.g. firewall), or LPWAN or Cloud infrastructure.
In the future, the security system should be self-aware such that in an event of a hacking attempt, the hacker should be immediately identifiable by the system. Machine learning should recognize emerging attacks, reverse out the hacker’s path, and characterize the hacking intelligence as it attempts to adapt and subvert the security system – in other words learn what the hacker is learning – and then calculate a tactical response to stop him.
Our Leadership Team
Francois Le served as SVP and Corporate Officer at N.E.T. (acquired by Sonus). He held executive positions at AOptix, Tropos (acquired by ABB), Aperto (acquired by Tranzeo) and 3Com (acquired by HPE). He got his MBA from Stanford and Engineering Degree from INSA-Lyon in France.
The 2 inventors behind iotaBEAM's technology have previously co-founded JetCell, a pioneer in GSM+IP pico-cell systems, acquired by Cisco for $200M. One of them was named at the prestigious position of Cisco Fellow after the acquisition. They subsequently co-founded 2 other startups and hold more than 70 patents among the 2 of them.
Who is our competition?
Silicon vendors who have implemented "Root of Trust" security in their CPU, thus locking in customers to their architecture and implementation.
Large solution vendors who have implemented what they call "end-to-end" security in their portfolio of IoT products, which typically would not extend beyond their gateways.
Cloud vendors with their cloud service offerings that lock in customers into their centralized certificate servers.
Other start-ups addressing the same market than iotaBEAM but will just perform endpoint behavior monitoring or implement a silicon-based security approach.
What is our key differentiator?
Our motto is KISS: Keep It Simple and Secure
iotaBEAM is a simple and ingenious security solution, the only one in the market today that can be implemented in software with minimum effort and cost all the way to the low complexity sensors and endpoint devices, with no impact on the existing design or change in the infrastructure
Check iotaBEAM's virtual presentation at IoT Live Slam 2018 in RTP, June 21 2018 and learn about our 5 Basic Design Rules to design or select the right security solution for low power, low complexity IoT sensors and endpoint devices.
Copyright © 2019 iotaBEAM™ and StarDust™ - All Rights Reserved.