Identity & Access Management , Multi-factor & Risk-based Authentication , Security Operations

Applying Security to Verify Deployed Products are Authentic

Today, IoT device makers face a rising tide of security threats – from botnets, compromise of end user data, IP theft, counterfeit products, etc.

One of the hardest security processes to defend is authentication, which can be used to detect counterfeit products as well as to support end user convenience by allowing secure touchless commissioning of new products into a trusted network. Strong authentication also makes a system more resistant to “man-in-the-middle” attacks. The security feature that supports product authentication is a customized Secure Identity.

Join this session by Silicon Labs to better understand the concept of Secure Identity, how it works and how it can be customized and used to support various authenticity-related use cases - including anti-counterfeit and streamlined commissioning. Also watch a demo of the Secure Identity customization workflow.


About the Author




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.