To help customers, partners and researchers to understand Trustonic’s suite of IoT security solutions, the following videos feature Dr. Richard Hayton, Chief Technology Officer at Trustonic, explaining the high-level concepts and practical examples of deployment.

1 – IoT Device Lifecycle Authenticity – Digital HologramsTM & Device Attestation

From silicon manufacture to sub-assembly component manufacture right through to in-market use and eventual recycling – fraudulent and counterfeit manufacture is a critical supply chain issue that ODMs and OEMs must address. Trustonic’s Digital HologramsTM and Device Attestation Services have been developed to help IoT device and service developers build ‘secure by design’ to solve these challenges:

Secure IoT device lifecycle management & IoT supply chain protection

Digital Holograms™

Secure IoT device lifecycle management & IoT supply chain protection. Digital Holograms™ are an innovative mechanism from Trustonic which enable web services to securely determine the lifecycle of an IoT device.

2 – IoT Device Cloud Configuration & Automatic In-Field Enrollment

Efficiently and cost-effectively deploying IoT devices to the field at massive scale requires both automatic cloud enrollment and trusted device authentication. Learn how Digital HologramsTM and Trustonic’s Cloud Services enable secure automatic enrollment.

IoT Cloud Security, Device Authentication & Enrollment

Automatic Cloud Enrollment

Secure automatic IoT device cloud enrollment, Enable IoT devices to securely identify themselves in the field with secured IoT device auto-enrollment.

3 – IoT Device Security – Secure Cloud Communications

Learn how Trustonic’s solutions for IoT device protection and cloud services enable advanced security when devices are deployed on Amazon Web Services and Google Cloud.