Security Overview: Conquering Security in the IoT Era

Issue link:

Contents of this Issue


Page 0 of 1

Conquering Security in the IoT Era The Internet of Things (IoT) opens up game-changing new opportunities from increased connectivity and the ability to better leverage data-driven insights, but it also ushers in unprecedented risks. With the proliferation of connected devices, the potential for new vulnerabilities is staggering. Cyberattacks can disrupt businesses, compromise intellectual property, or wreak financial and reputational damage. In the case of critical infrastructure, such as defense, energy, industrial automation, medical, and transportation applica- tions, they can compromise national security or even result in life-threatening consequences. With the stakes higher than ever, the time to act is now. AT WIND RIVER, TRUST IS EMBEDDED Security is embedded in our DNA at Wind River ® . It is part of our rich heritage of more than 30 years in mission-critical sys- tems in markets such as aerospace and defense. It is built into all the technologies we provide to help you develop trusted and reliable solutions. Our solutions and services deliver everything needed to secure your hardware and software, protect communication between devices and across systems, safeguard them over time, and respond quickly as new threats emerge. What's more, our development processes and security capabilities meet rigorous requirements in place across many industries. DEFINE YOUR SECURITY STRATEGY WITH PROFESSIONAL SERVICES Different devices, systems, and industries have varying security requirements and often require a custom touch. Our Professional Services can deliver a consultative process to determine the type and level of security appropriate for your project. Using the security principles of the CIA triad model, our assessment will help you understand the Confidentiality, Integrity, and Availability considerations of your system architecture, set security policies, and guide your security invest- ments. We can help you build in security from step one and for every stage of the process. SECURITY INCIDENT RESPONSE Knowing that savvy attackers could find vulnerabilities in even the most secure systems, Wind River has developed a best- in-class incident response process. Our team actively monitors a variety of sources (NIST, US-CERT) through the Common Vulnerabilities and Exposures (CVE) database at, will proactively notify you of potential vulnerabilities that might impact supported Wind River products, and will offer resolution measures even before the community is aware of the vulnerability. Our response process helps protect devices from cyberattacks even after product deployment. WIND RIVER SOLUTIONS AND TECHNOLOGIES FOR IRON-CLAD SECURITY With built-in security capabilities, our offerings enable you to implement comprehensive security that minimizes attack sur- faces end to end, from devices through communications networks and gateways to the cloud. Our offerings follow a strict security development process from assessment through deployment, providing reassurance that these solutions are highly secure and reliable for critical infrastructure IoT systems. Security Overview WHEN IT MATTERS, IT RUNS ON WIND RIVER

Articles in this issue

Links on this page

view archives of Briefs - Security Overview: Conquering Security in the IoT Era