The solution provides a hardware root-of-trust in the device’s flash memory that blocks unauthorized modifications to prevent persistent control of the device. The control of flash updates is moved from the vulnerable remote edge device to a trusted entity in the utility data center, ensuring that only validated commands and updates will modify the flash. In addition, the hardware root-of-trust provides reliable and valuable data such as attack alerts, status reports, and detailed forensic data.
NanoLock’s technology protects connected edge devices from the moment they are created prohibiting malicious code from being written into the flash, and provides protection and monitoring throughout the device’s entire lifecycle. This approach is both processor-and operating system-agnostic and requires virtually zero system processing power, which is critical for power-sensitive IoT devices.
For more information, visit www.adestotech.com.
About the AuthorFollow on Twitter Follow on Linkedin More Content by Perry Cohen