About IoT Platform
The Sectigo IoT Platform enables OEMs, their supply chains, and enterprises to secure connected devices and technologies at scale. It’s the first and only solution that combines our unique Embedded Security Suite, a comprehensive, modular suite of embedded device-hardening solutions developed by Icon Labs, with the Sectigo IoT Manager, a purpose-build certificate issuance and management system.
A key element of the Sectigo IoT Platform, Sectigo IoT Manager provides trusted, mutual-authentication solutions for all IoT devices and networks, from both cloud-native or on-premise CAs, enabling companies to securely build out and scale their ecosystems and manage the full device lifecycle.
The other key element of the Sectigo IoT Platform is the Icon Labs Embedded Security Suite, a complete set of technologies designed to improve security on the device itself. It includes Secure Boot, Trusted Platform Module (TPM) integration, secure key storage, data at rest encryption, embedded agent provisioning, TLS library support to encrypt data in transit, embedded firewall, and over-the-air updates.
The IoT Platform enables your IoT business models and secures your connected devices by ensuring connected device identity and integrity, and providing flexibility and interoperability with multiple trust models, device types, operating systems, chipsets and protocols. It removes the complexity associated with PKI, enabling you to concentrate on what you do best, not on managing the PKI infrastructure.
Common Use Cases
The Sectigo IoT Platform is the ideal solution for:
|Certificate Issuance: With purpose-built Sectigo IoT Manager, issue certificates quickly and easily in high volume. You will have the choice of a cloud-based, a manufacturer on-premises Private CA, or a hybrid solution.||Certificate Provisioning: Rapidly, scalably, and cost-effectively provision certificates onto devices at the point of manufacture using our lightweight PKI agent, EST, or REST API.||Certificate Lifecycle Management: Use our lightweight PKI agent to perform certificate lifecycle management in the field without device downtime, ensuring cryptographic agility for years or even decades in the future.|
|Secure Boot: Verify the bootloader, microkernel, OS, and applications on each connected device. Ensure the code running on your devices is the code you authorized.||Monitoring and Control: Use our embedded firewall to perform anomaly detection and identify traffic variances against pre-defined conditions.||Secure Key Storage: Securely store certificates on your devices, using our integration library to the hardware’s Trusted Platform Module (TPM) or our software-based secure certificate storage.|
|Data at Rest Encryption: Encrypt the data on your devices and protect it from malicious actors.||Data in Transit Encryption: With TLS library support, protect data as it’s transmitted across network boundaries.||Over-The-Air Updates: Enable secure firmware updates in the field.|