View
Sorting
From A to Z
Products found: 2
Icon Labs Floodgate IoT Security Toolkit
The Floodgate IoT Security Toolkit provides engineers with developing IoT devices a comprehensive security solution allowing them to build secure, authenticated, and trusted devices. The solution enables a scalable level of security for any IoT device running an RTOS or embedded Linux. It is the only security platform providing a full suite of device protection, secure credentialing services, and full integration with IoT cloud services. The toolkit includes the following security elements: secure boot, secure software updates, firewall, intrusion detection, MQTT, TLS, and a management agent.
Key elements of the toolkit are:
- Management system integration with Verizon ThingSpace and the Floodgate Security Manager
- Certificate Authority integration allows enrollment with any CA
- Floodgate firewall and intrusion detection
- Secure communication via TLS
- Secure boot—validates the boot process at all stages
- Secure firmware updates
- Secure key/certificate storage
- TLS—a lightweight implementation providing security over any network connection
- MQTT—a messaging protocol ideal for resource-constrained connections
-
-
ROI-
-
7
10
Icon Labs Floodgate Security Framework
Floodgate Security Framework (FSF) provides engineers developing embedded devices a comprehensive security solution allowing them to build secure, authenticated, trusted devices. IT security practices require endpoints to be authenticated, trusted, secured, and managed before they are allowed to operate on the corporate network. IT/OT convergence, and the emergence of security standards in various industries, requires embedded devices provide the same security capabilities as IT devices. The Floodgate Security Framework provides:
- Management system integration for IT/OT convergence
- Security capabilities to ensure the device is protected from attack
- Building blocks for compliance with security standards including EDSA, ISA/IEC 62443 and NIST Cybersecurity guidelines
- Automotive manufacturing plant shutdown resulting from a cyber-attack
- Pipeline monitoring system that failed due to a DoS attack
- Train system delays caused by hackers
- Sewage spill caused by a control system hacked by an insider
- Proliferation of malware targeting industrial automation systems including Stuxnet, Flame, Havex and BlackEnergy
-
-
ROI-
-
7
18
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.

