Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Tech Companies Partner to Securely Connect IoT to Cloud

Thales, Telstra, Microsoft, and Arduino this week announced a partnership aimed at enabling the secure connection of IoT devices to the cloud.

Delivering end-to-end connectivity between devices and cloud platforms, the solution enables “instant and standardized mutual authentication” over cellular networks.

Thales, Telstra, Microsoft, and Arduino this week announced a partnership aimed at enabling the secure connection of IoT devices to the cloud.

Delivering end-to-end connectivity between devices and cloud platforms, the solution enables “instant and standardized mutual authentication” over cellular networks.

Moreover, it is fully compliant with the GSMA IoT SAFE (IoT on-SIM Applet For Secure End-2-End Communication) security specifications, which provide a standard for the use of Secure Elements (SIM, eSIM, eSE) to secure IoT applications.

With billions of IoT devices transferring data to and from the cloud, ensuring security requires both the IoT cloud service and the device to trust the received data. Mutual authentication ensures that the device and the cloud trust each other, but the fragmentation of the IoT market means that security services scalability and duplication are very limited.

Thales, Telstra, Microsoft, and Arduino seek to address the challenge of connecting IoT devices to clouds in a secure manner through cellular networks. The required level of trust is ensured through the use of the standardized SIM or eSIM technology.

Through this partnership, the SIM or eSIM inside an IoT device is automatically and securely provisioned, as long as they have Thales’s IoT SAFE application on them. The trusted communication with the cloud is ensured through digital certificates created and stored in the SIM/eSIM.

Microsoft’s contribution to the IoT SAFE solution includes Azure IoT Hub, Azure Stream Analytics, Cosmos DB, and Power BI services. Arduino contributed with a new open-source library that implements the security mechanism of GSMA IoT Safe on the MKR NB 1500 boards and also provides an alternative to the crypto chip on the Arduino board.

“The collaborative effort between these international organizations demonstrates the importance of simplifying IoT security without compromise. By bringing together each IoT technology layer; device, software, network and cloud, we can deliver a more streamlined approach to IoT security. This allows customers and partners to focus on creating business value from their solutions while ensuring their IoT deployments remain secure,” said Tony Shakib, general manager of Azure IoT Business Acceleration at Microsoft.

Advertisement. Scroll to continue reading.

Related: Kr00k Vulnerability Exposed Data From Over a Billion Wi-Fi Devices

Related: Cisco Launches Industrial IoT Security Solution

Related: Microsoft Makes Azure Security Center for IoT Generally Available

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.