Solution Providers Applaud New Security Protocol, Citing Security Concerns For IoT

The new protocol will be used with Public Key Infrastructure and Certificate Authority-based trust architectures, which enable service providers, app developers and OEMs to utilize their own keys to authenticate and manage software and data assets.

Goldstein, for his part, said his company is currently looking at the Internet of Things from a security perspective, particularly from the role that wireless networks play in IoT.

“For us, we want customers to know that if they access their networks, files will be protected, even as IoT grows,” he said.

Other companies joining in to work on the protocol include Intercede, Solacia, Verimatrix, and Thundersoft.