When million or billion dollar business decisions are being driven by IoT sensor data, it’s critical to know that your data is coming from the source you’re expecting. When cyber attacks have real-world consequences, real-time identity management is crucial.
Effective management requires the ability to determine the provenance of entities that are interacting, the ability to add and remove devices, servers, users, and services as needed, and the ability for entities to prove their identity to one another automatically. Identity is fundamental to unlocking to full functional and financial opportunity of IoT.
oneID enables full identity management
oneID IoT was designed from the ground up to provide the robustness and flexibility required to manage billions of connected identities.
Automated multi-factor authentication
Behavioral anomaly detection
oneID has developed a unique asymmetric key-based architecture that enables automated multi-factor authentication (MFA). Automated MFA works in a similar fashion to user-based MFA, whereby an entity must authenticate via two or more separate validation mechanisms.
“Automated” means that entities can assert and validate without human intervention. The oneID architecture enables n-factor validation which can be customized to the demands of your particular application, limiting credential-based attacks and significantly raising the bar on unauthorized access. Bi-directional and mutual authentication raises the bar again by ensuring that requests can only be read by the intended recipient.
Attackers compromise IoT deployments by going after devices first. Their goal is to penetrate a single device, figure out how it works, and use that knowledge to weaponize attacks that can compromise other devices, your network, or servers. oneID is designed to leverage secure elements to lock keys to the entities on which they’re deployed, eliminating key theft and identity spoofing, effectively shutting down an attacker’s ability to weaponize an attack
According to the Verizon report, typical time from breach to detection is 180 days. That’s almost six months of allowing attackers unfettered access to your systems, data, and operations. Being able to quickly identify compromises is a critical need. One of the biggest indicators of a compromise is a change in behavior. oneID anomaly detection analyzes authentication requests for behavioral outliers, helping to quickly identify compromises and performance issues with any node in your deployment.
Once you’ve identified that a node is misbehaving you need to be able to remove it from system interaction as soon as possible.
oneID for IoT enables real-time revocation of any identity in any of your deployments. Once issues are resolved, identities can be reinstated in real time, too.
Contact us for more information.