Skip to main content

Please note that u‑blox no longer supports Internet Explorer.

We recommend using the latest version of Google Chrome or Firefox.

Ok

IoT Security-as-a-Service

Quick facts

Average time to identify a breach in 2019

206

days

Attacks on Internet of Things devices

5,200

per month

Time between hacker attacks

39

seconds

Protect your business-critical data from device to cloud with u-blox IoT Security-as-a-Service

u‑blox services are delivered by the Thingstream IoT service delivery platform.

Contact Thingstream support

We provide IoT Security-as-a-Service

u‑blox's innovative IoT security solution makes it extremely simple to protect your data, both on the device and during the transmission of data from the device to the cloud. This ensures that you can focus on your business and enjoy faster time-to-market.

We implement a true end-to-end concept where data are protected from the device to the end-user and are not visible by the intermediate nodes/platforms nor by the service provider.

Our approach ensures minimal code development and investment and the highest standards of security, leveraging the Root of Trust in R4 and R5 module platforms to bring a unique and immutable identity for a univocal identification and on-boarding in the leading IoT cloud platforms.

The innovative symmetric key management system delivers an unprecedented level of IoT security giving the possibility to generate on-the-fly an infinite number of crypto keys different for each device to be used for (D)TLS or for any other purpose.

All u‑blox IoT security solutions are accurately designed for LPWA constrained devices, reducing the data usage and number of flights, thus minimizing the power consumption that is a critical metric for most IoT devices.

remote camera

Trust and control your device

Unique and immutable device identity and robust root of trust are the foundation of IoT Security.

  • TEE (R4 platform) and HW (R5 platform) root of trust
  • Secure production
  • Secure boot
  • Anticloning detection & rejection
  • Secure updates
  • Secure communications via (D)TLS 1.2 protocol stack
fingerprint

Protect critical data on device

Guard sensitive information on your device without the need for a specialized trusted chip.

  • Protect data via Authenticated Encryption with Associated Data (AEAD) and AES encryption and store information even in a non-secure location
  • Defend data at rest against theft, tampering, or injection
  • Secure the communication between modem and microcontroller with AES encrypted messages
  • Save space and simplify the design of your device
car factory with robots

Protect critical data between device and cloud

Ensure the real end-to-end privacy, integrity, and authenticity of your data in transit

 

  • Securely transfer data between device and cloud/end user without writing any security code or using additional hardware
  • Leverage the u-box symmetric Key Management System to generate infinite number of cryptographic keys for secure sessions
  • Protect data with AEAD and AES encryption and reduce overhead by up to 8X on (D)TLS sessions
  • Reduce power consumption and handshakes by entirely removing the need for certificates
  • Keep the full control of cryptographic keys without the need for a PKI or PSK infrastructure 

 

girl drinking coffee and playing on the phone

Easily onboard your device in cloud platforms

Out-of-the-box, simple, secure, and cost-effective onboarding with the leading IoT cloud platforms

  • On-board your device on IoT cloud platform, based on X.509 certificates
  • Remotely deploy device and root certificates into the device with the Zero-touch provisioning
  • Easily manage the entire lifecycle of the certificate

IoT Security-as-a-Service use cases

iot-security-asset-tracking.jpg

Asset tracking

For asset tracking, data authenticity is essential, as well as the secure local storage of collected data and an easy secure cloud onboarding. Since the device is usually battery operated, it is mandatory to use an efficient way to transmit data securely to the cloud, reducing the power consumed.

iot-security-connected-health.jpg

Connected health

Connected health requires confidentiality and authenticity to ensure that only the patient and the healthcare provider (or the doctor) can access sensitive data. Software and data tampering pose a huge risk for patient safety.

iot-security-industrial-monitoring.jpg

Industrial monitoring

Industrial monitoring applications require the capability to monitor both the working status of a machine and the real-time condition of the production line. To intervene properly before  machine downtime occurs and to make real-time decisions, it is mandatory to always trust the data reported by the sensor to the cloud application, providing a reliable way to ensure the integrity and authenticity of the data.

iot-security-smart-home.jpg

Smart building and smart home

Smart building and smart home networks shall guarantee the confidentiality and authenticity of the data to protect customer privacy and securely transfer personal data. Additionally, it is crucial to securely share collected data across trusted stakeholders and the secure authentication of the devices to the cloud.

iot-security-telematicics.jpg

Telematics

Telematics IoT devices must ensure 24/7 availability of business operations as well as authenticity of devices. It is also mandatory to protect the safety of personnel and fleet through accurate and protected data. The main risks to address are denial of service, cloning of devices, jamming, and data thefts.

iot-security-metering.jpg

Metering

Metering applications want to protect billing revenues by ensuring the authenticity and integrity of end-user data; securely remote-control meters for safety and billing purposes, and establish trusted communication to transmits data securely and only to authorized servers.

u‑blox services are delivered by the Thingstream IoT service delivery platform.

Contact Thingstream support

GSMA banner