SlideShare a Scribd company logo
1 of 10
w w w . i o t a r m o u r. c o m
1
Next-generation Cybersecurity for connected IoT devices and
critical infrastructure; powered by SDP and Blockchain technology
Blockchain-based digital identity for
users and connected devices
Tamper-proof logging of all access
and connectivity
Locked-down & secured access to
critical IoT systems
w w w . i o t a r m o u r. c o m
2
Smart, connected devices are now an integral part of
our lives, in business and at home
Smart homes and
offices enabled with a
host of connected and
smart devices
Connected cars,
autonomous trucks,
unmanned
aerial vehicles, etc
Industrial control systems
w/ cyber-physical
platforms managing
critical infrastructure
Smart Cities with sensors
and digital mgmt. systems
for energy, utilities,
transportation, etc
The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025
w w w . I o TA r m o u r. c o m
w w w . i o t a r m o u r. c o m
3
The rapidly growing world
of perpetually-connected
smart devices presents
proportionally large
security risks
In 2016, botnet armies DDoS attack of DNS infrastructure
sent major internet platforms and services offline
Since 2016, researchers have shown how attackers could
hijack a vehicle. In 2017, US Homeland Security cyber
sleuths hacked a Boeing 757 as it sat on the runway
In 2017, criminals hacked a connected fish tank
and stole data from a casino
A researcher at the Black Hat 2018 conference revealed how
attackers could take control of SATCOM devices to remotely
compromise security and attack planes, boats, and military tech
Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world
The Challenge: The Internet of Things that connects numerous everyday
devices also opens up previously closed systems to remote access & control
w w w . i o t a r m o u r. c o m
4
The Solution: Block Armour was
accelerated by Airbus and has
developed a next-gen Zero Trust
Cybersecurity solution IOT Armour;
designed explicitly for connected
devices, integrated IoT systems and
related communication networks
The solution was featured as one of the Top 25
innovations worldwide in cybersecurity by Accenture
w w w . i o t a r m o u r. c o m
5
The Building Blocks: IOT Armour is powered by Software Defined Perimeter
(SDP) architecture & Blockchain technology
SDP architecture renders core systems and communication gateways invisible to attackers; while customized agents along
with private Blockchain technology delivers a new breed of digital identity and access control for all connected devices
Software Defined Perimeter (SDP)
Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD
All communication between devices and control systems is secured using 4096 bit RSA encryption
Blockchain
Technology
Decentralization
Cryptographic Encryption
Immutability
Consensus-based Control
SDP
Controller
Accepting SDP
Host
Accepting SDP
Host
Initiating SDP
Host
1. Centralized Controller
4. List of authorized
Accepting Hosts determined
5. Accept communication from
Initiating Host
2. Mutual secure comm. to
Controller
Control Channel
Data Channel
6. Receive list of IP’s of
Accepting Hosts
3. Mutual secure comm. to
Controller
7. Mutual secure
comm. channels
w w w . i o t a r m o u r. c o m
6
The Architecture: End-to-end Industry 4.0 security
Unlike point products, the Secure Shield architecture delivers end-to-end Zero Trust security in a holistic manner,
securing the connected devices, the IoT gateway, core systems as well as all communication channels
Comms Systems
Data Centres
Invisible Gateway
Secure Shield Controller
User
Device User
Device
Control
Centre
Mutual
Authentication to
establish Trust
Precise Encrypted Dynamic Network Access
Gateway Admin
Systems
Administration
- IoT Armour Agent
Sensors
Authenticate
User & Device
w w w . i o t a r m o u r. c o m
7
IOT Armour harnesses digital signature based identity and authentication, not
just IP Address to identify, authenticate and authorize devices
AUTHENTICATION
& AUTHORIZATION
of devices
REGISTRATION and
ID of new device
SECURE CHANNELS
for inter-device
communication
SECURED ACCESS
to core systems
Identity & Access
Validation Nodes
Identity & Access
Validation Nodes
CORE
SYSTEMS
The platform secures interconnected devices and communication networks while
tightly ring-fencing OT and IT systems
INTERNET OF THINGS
w w w . i o t a r m o u r. c o m
8
IOT Armour’s Zero Trust
setup allows for micro
segmentation of
connected devices as
well as associated users
The platform facilitates fine-grained resources’
access and comprehensive management of the
policy engine on the Blockchain
8
w w w . I o TA r m o u r. c o m
w w w . i o t a r m o u r. c o m
9
The Result: A next-gen military-grade security system to protect
connected devices and critical infrastructure against cyber threats
Cryptographically-
secure digital identity
for users, connected
devices and central
servers/services
Best-in-class military-
grade encryption
for secured access to
connected devices and IoT
communication
Invisible & locked down
critical systems
with micro segmentation
and fine-grain access control
Immutable & tamper-
proof logs
stored securely on the
Blockchain for instant
access / analysis
Its time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology!
w w w . I o TA r m o u r. c o m
w w w . i o t a r m o u r. c o m
10
Learn how you can secure IoT devices
and critical systems with Blockchain-
enabled next-gen cybersecurity
Drop us a line or reach us via any of the channels below:Reach Us
+91 9820386446
+65 96536243
@blockarmourinfo@blockarmour.com
www.blockarmour.com
IOT Armour is a product by award-winning cybersecurity venture, Block Armour

More Related Content

What's hot

What's hot (19)

Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
Block Armour Case Study
Block Armour Case StudyBlock Armour Case Study
Block Armour Case Study
 
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
 
Esd Networks india
Esd Networks indiaEsd Networks india
Esd Networks india
 
Esd Networks India
Esd Networks IndiaEsd Networks India
Esd Networks India
 

Similar to Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology

Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
journalBEEI
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
Nirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
Stéphane Roule
 

Similar to Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology (20)

Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 
eMsecure
eMsecureeMsecure
eMsecure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
 

More from Block Armour

More from Block Armour (8)

Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networks
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space Age
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 final
 
Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity
 
IoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT SecurityIoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT Security
 
IoT Armour: the Solution
IoT Armour: the SolutionIoT Armour: the Solution
IoT Armour: the Solution
 

Recently uploaded

NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Dubai Multi Commodity Centre
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
seri bangash
 

Recently uploaded (20)

Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical TrialsSalesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdf
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deck
 
A Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob BadgettA Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob Badgett
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed Guide
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 

Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology

  • 1. w w w . i o t a r m o u r. c o m 1 Next-generation Cybersecurity for connected IoT devices and critical infrastructure; powered by SDP and Blockchain technology Blockchain-based digital identity for users and connected devices Tamper-proof logging of all access and connectivity Locked-down & secured access to critical IoT systems
  • 2. w w w . i o t a r m o u r. c o m 2 Smart, connected devices are now an integral part of our lives, in business and at home Smart homes and offices enabled with a host of connected and smart devices Connected cars, autonomous trucks, unmanned aerial vehicles, etc Industrial control systems w/ cyber-physical platforms managing critical infrastructure Smart Cities with sensors and digital mgmt. systems for energy, utilities, transportation, etc The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025 w w w . I o TA r m o u r. c o m
  • 3. w w w . i o t a r m o u r. c o m 3 The rapidly growing world of perpetually-connected smart devices presents proportionally large security risks In 2016, botnet armies DDoS attack of DNS infrastructure sent major internet platforms and services offline Since 2016, researchers have shown how attackers could hijack a vehicle. In 2017, US Homeland Security cyber sleuths hacked a Boeing 757 as it sat on the runway In 2017, criminals hacked a connected fish tank and stole data from a casino A researcher at the Black Hat 2018 conference revealed how attackers could take control of SATCOM devices to remotely compromise security and attack planes, boats, and military tech Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world The Challenge: The Internet of Things that connects numerous everyday devices also opens up previously closed systems to remote access & control
  • 4. w w w . i o t a r m o u r. c o m 4 The Solution: Block Armour was accelerated by Airbus and has developed a next-gen Zero Trust Cybersecurity solution IOT Armour; designed explicitly for connected devices, integrated IoT systems and related communication networks The solution was featured as one of the Top 25 innovations worldwide in cybersecurity by Accenture
  • 5. w w w . i o t a r m o u r. c o m 5 The Building Blocks: IOT Armour is powered by Software Defined Perimeter (SDP) architecture & Blockchain technology SDP architecture renders core systems and communication gateways invisible to attackers; while customized agents along with private Blockchain technology delivers a new breed of digital identity and access control for all connected devices Software Defined Perimeter (SDP) Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD All communication between devices and control systems is secured using 4096 bit RSA encryption Blockchain Technology Decentralization Cryptographic Encryption Immutability Consensus-based Control SDP Controller Accepting SDP Host Accepting SDP Host Initiating SDP Host 1. Centralized Controller 4. List of authorized Accepting Hosts determined 5. Accept communication from Initiating Host 2. Mutual secure comm. to Controller Control Channel Data Channel 6. Receive list of IP’s of Accepting Hosts 3. Mutual secure comm. to Controller 7. Mutual secure comm. channels
  • 6. w w w . i o t a r m o u r. c o m 6 The Architecture: End-to-end Industry 4.0 security Unlike point products, the Secure Shield architecture delivers end-to-end Zero Trust security in a holistic manner, securing the connected devices, the IoT gateway, core systems as well as all communication channels Comms Systems Data Centres Invisible Gateway Secure Shield Controller User Device User Device Control Centre Mutual Authentication to establish Trust Precise Encrypted Dynamic Network Access Gateway Admin Systems Administration - IoT Armour Agent Sensors Authenticate User & Device
  • 7. w w w . i o t a r m o u r. c o m 7 IOT Armour harnesses digital signature based identity and authentication, not just IP Address to identify, authenticate and authorize devices AUTHENTICATION & AUTHORIZATION of devices REGISTRATION and ID of new device SECURE CHANNELS for inter-device communication SECURED ACCESS to core systems Identity & Access Validation Nodes Identity & Access Validation Nodes CORE SYSTEMS The platform secures interconnected devices and communication networks while tightly ring-fencing OT and IT systems INTERNET OF THINGS
  • 8. w w w . i o t a r m o u r. c o m 8 IOT Armour’s Zero Trust setup allows for micro segmentation of connected devices as well as associated users The platform facilitates fine-grained resources’ access and comprehensive management of the policy engine on the Blockchain 8 w w w . I o TA r m o u r. c o m
  • 9. w w w . i o t a r m o u r. c o m 9 The Result: A next-gen military-grade security system to protect connected devices and critical infrastructure against cyber threats Cryptographically- secure digital identity for users, connected devices and central servers/services Best-in-class military- grade encryption for secured access to connected devices and IoT communication Invisible & locked down critical systems with micro segmentation and fine-grain access control Immutable & tamper- proof logs stored securely on the Blockchain for instant access / analysis Its time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology! w w w . I o TA r m o u r. c o m
  • 10. w w w . i o t a r m o u r. c o m 10 Learn how you can secure IoT devices and critical systems with Blockchain- enabled next-gen cybersecurity Drop us a line or reach us via any of the channels below:Reach Us +91 9820386446 +65 96536243 @blockarmourinfo@blockarmour.com www.blockarmour.com IOT Armour is a product by award-winning cybersecurity venture, Block Armour