Solution Overviews

Datasheet: Irdeto Trusted Telemetry for Industrial IoT

Issue link: https://resources.irdeto.com/i/1125568

Contents of this Issue

Navigation

Page 0 of 1

Datasheet Last modification: 5-11-2019 / 02:01 pm GMT+01:00 www.irdeto.com 1 © 2019 Irdeto. All Rights Reserved. IRDETO TRUSTED TELEMETRY FOR INDUSTRIAL IOT Detect the hacker before the attack occurs! Early warning security events notify you when a hacker is "playing" with applications or devices in your IIoT ecosystem or trying to find a hole in your software. Industrial Control Systems (ICS) have become strategic and lucrative hacking targets given the sensitivity of the systems and data, as well as greater exposure from increased connectivity in the ecosystem. Recent news has shown how complicated the exploits can be, with sophisticated approaches that include manipulating device telemetry/logging to mask the hacker's efforts and increase the effectiveness of the attack. Manage the proliferation of connected devices throughout the Industry 4.0 ecosystem Irdeto's Trusted Telemetry delivers early warnings of an attack through a small, portable agent well suited to extending your security coverage, even to tiny microprocessor and RTOS based systems. Critical security events are passed, in protected telemetry packets, to a containerized server component that facilitates easy formatting of data for analysis. Trusted Telemetry agent APIs make it easy to add additional system or application level data as required. Having robust, reliable security telemetry data reporting the precursors to an attack can help SIEM/SOAR systems scale to accommodate the massive increase in connected devices and be more proactive in mitigating attacks. Qualified, integrity verified telemetry data can also unburden cognitive/AI based systems since no deductions or complicated forensic analysis is required. Trusted Telemetry provides near real-time detection of hacker activity on IIoT devices for timely containment of threats and can create secured forensic logs for post- event analysis on air-gapped devices. Better data-driven business decisions for security solutions Trusted Telemetry provides independent indications of gateway integrity, revision level, suspicious libraries and activities, as well as other cybersecurity events of interest, such as device attachments and output devices available. History has demonstrated that IIoT attacks are multi-phase efforts that can be mitigated early with careful monitoring of critical security events and orchestrated responses. The telemetry agent can easily be deployed into almost any IIoT node, requiring only user-space privileges. It can leverage existing protocols for communications. KEY BENEFITS Real-time detection of exploits • Extends trust to IIoT edge devices, such as sensors and logic controllers, to improve security posture • Produces trusted logs for critical security events • Supports a broad range of robust, integrity verified telemetry • Supports a defense in depth philosophy which reduces dependence on fallible perimeter security or compromised management interfaces • Leverages the proven Irdeto anti-hacking technologies in a simple, easy-to-deploy fashion Trusted/robust security telemetry • Provides both system and application level telemetry data • Produces reliable critical security events, such as: • Integrity Verification (IV) to detect software tampering • Hooking detection • Jailbreak/rooting detection • Privilege escalation • Easy API to extend protections to device apps and for apps to produce proprietary telemetry Server plays well with others • Telemetry server provided to process messages, store and forward events • Containerized server for easy deployment • Available as part of Irdeto Security Services cloud offering, or on-premise enterprise solution • Seamless integration with popular SIEM systems, such as IBM's QRadar and others Broad device coverage • Delivered as portable C code for broadest possible device coverage • Small size (footprint) • Simplified OS abstraction layer for easy porting • Requires user space only, no kernel modifications needed – yet strong security is maintained • Pre-integrations for several popular embedded OS (Inquire about rollout) • iOS, Android, Linux, and several RTOS

Articles in this issue

Links on this page

view archives of Solution Overviews - Datasheet: Irdeto Trusted Telemetry for Industrial IoT