Security system protects IoT devices from cyber-attack
A security management software suite specifically designed to protect IoT and embedded devices against cyber-attack has been released by Icon Labs. The Floodgate Security Manager (FSM) can be operated as either an on premise or a cloud-based security manager.
The manager provides device status monitoring, security policy management, command audit logging, and security event logging and reporting for devices running Icon Labs’ Floodgate Agent or other lightweight IoT management protocols such as COAP and MQTT. The FSM also offers comprehensive reporting and auditing capabilities to help achieve EDSA Certification, ISA/IEC 62443 Compliance, and/or compliance with the NIST Cybersecurity framework.
“The current approach to security management for IoT devices is to repurpose legacy security management systems. While this solution works for some IoT gateways and other large IoT devices, it does not scale to the smallest IoT devices, especially small battery powered edge devices and sensor solutions,” says Alan Grau, President and Cofounder, Icon Labs. “The FSM is designed to provide the management services required by all IOT devices, including small, battery powered and mobile devices without the overhead and complexity of traditional enterprise security management systems.”
“With the IoT growing dramatically, it’s only a matter of time before hackers turn more attention toward embedded systems with limited onboard security resources,” said Steve Hoffenberg, a Director at VDC Research. “New security technologies are needed not only to protect IoT device functionality and data, but also to protect conventional IT and the cloud assets to which the embedded systems are connected.”
Icon Labs products provide embedded security for IoT and M2M solutions such as aerospace, military and space probes, industrial and medical control devices, medical systems, and consumer electronics products. The Floodgate Security Framework provides a ‘defense in depth’ solution that protects control units and endpoint devices from cyber threats, aids in compliance with regulatory mandates and guidelines, and gathers and reports command, event and device status information for audit requirements.