Download PDF version Contact company

Icon Labs, a provider of security solutions for IoT and edge devices, announced Icon Labs President Alan Grau has been selected to present at Embedded World Show Europe.

Alan’s presentation will provide engineers, product managers, and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secure IoT devices.

Security Management

Engineers developing IoT devices have a wide range of choices for adding security to their device. Hardware security elements including TPMs, TEEs and secure elements are available from a variety of vendors. Software security solutions are also available that can provide a variety of features include secure communication, authentication, firewalls, secure boot, secure firmware updates, and security management.

The presentation will discuss some recent hacks, cyber security trends, and a detailed overview of IoT security technologies and how they can be applied to secure IoT devices. Specific attention will be paid to the trade-offs and interactions between hardware and software security implementations.

Key Topics

Topics covered include:

  • Hardware security: Description of TPMs, TEEs, TrustZone and other HW security elements and how they are used in IoT devices
  • Software security: Firewalls, encryption, security protocols and secure boot
  • Hardware vs. Software: The role of HW security vs. The role of SW security
  • What security features does your IoT device require? What are the minimum requirements?
  • Scalability issues: How to address security for sensors, endpoints, and gateways
  • System level view of security

Embedded Security

Icon Labs’ products provide embedded security for IoT and Machine-to-Machine (M2M) solutions in aerospace, industrial, medical control devices, and consumer electronics. The Floodgate Security Framework provides a ‘defense in depth’ solution to protect control units and endpoint devices from cyber threats, aid in compliance with regulatory mandates and guidelines, and gather and report command, event, and device status information for audit requirements.

Download PDF version Download PDF version

In case you missed it

What Challenges Do End Users Face When Working With Integrators?
What Challenges Do End Users Face When Working With Integrators?

The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how...

Humboldt Forum Relies On Intelligent Locking System From ASSA ABLOY
Humboldt Forum Relies On Intelligent Locking System From ASSA ABLOY

After around nine years of construction, the Humboldt Forum is gradually opening its doors. In the heart of Berlin's historic center, it was set up as a modern space for culture an...

Milestone Systems: Open Platform Video Technology Tees Up Enhanced Safety For PGA’s Houston Open
Milestone Systems: Open Platform Video Technology Tees Up Enhanced Safety For PGA’s Houston Open

Intent on bringing the Houston Open back to Memorial Park Golf Course, the Houston Parks and Recreation Department (HPARD) reached out to the Houston Living Lab (HLL), Milestone Sy...