The Security Design Lab

Come and generate your on line security report

The Security Design Lab is a large Collaboration Network between IMREDD, Sikur Lab, Entities and Companies, to generate discussions, experiences and disseminating knowledge to increase the security of IoT devices at the source.

Thinking and creating in a practical collaborative way the future of cybersecurity, emerges as world reference pole for companies, IOT manufacturers and governments. The SDL delivers solutions for serious security challenges related to mobility, autonomous vehicles, smart Home, Smart City, Smart Grid, Industry 4.0 and “anywhere working” trends.

Focused on ensuring privacy and security in highly capillarized environments, the SDL also brings sharp solutions for authentication, privileged access and digital interactions H2H & M2M, developing applied research in Artificial Intelligence, mobile edge computing and quantum cybersecurity, anticipating from France practical solutions for all partners around the world.

The SDL will allow companies (manufacturers of IoT devices, Solution Integrators, Connectivity Providers, telco companies and general smart devices industry) to test the Security and Management of their connected assests in a living and real environment, prior market deployment and compliance with data regulations in each geography.

This large network will also serve to enable end users (companies and governments) to access devices and technologies that can expand and improve the level of security in its own projects, becoming the SDL a world reference center for large-scale security projects.

Main Testing Phases

1

Phase One – Diagnostic:

SDL will analyze IoT devices in all aspects of security. A report will be delivered with all the vulnerabilities found

2

Phase Two – Use Case:

SDL will present similar use cases installed at the IMREDD Laboratory, to demonstrate effective security measures in practice

3

Phase Three – Proof of Concept:

This phase will consist of installing the security solution on the IoT device to simulate the actual tests. The owner of the IoT device will test the solution in his laboratory. The technician will be guided on how to use the Platform and will receive a final report on the project.

Start Device Test

The Security Design Lab – Main Security Items to be Tested

Some of the most critical issues in the IoT realm will be tested, like device authentication, authorization, and access control, ensuring privacy and protecting against the most common hacker attacks. IoT devices in the automotive, agriculture, mining, steel, power systems, healthcare systems, and many more industries can eliminate safety risks and comply with regulations.

Identity Management

  • Secure user access to any IoT system and application
  • Stop default passwords

Passwordless Authentication

  • User and permission control within applications and systems
  • Strong authentication, using encryption and automation keys

Device Management

  • No device will be accessible anonymously
  • Secure update and upgrade
  • Protection against theft of equipment

Secure Storage/ Secure Data Colection

  • Secure storage of data collected from devices
  • Secure device data collection

Secure Tunnel/ Reverse Tunnel

  • A secure device access tunnel, even on unstable networks
  • Reverse access tunnel when firewall restrictions apply

Zero Touch

  • Automatic deployment
  • Remote provisioning of new devices
  • Easy, no-touch registration

Auditing and Compliance

  • Usage monitoring and security alerts
  • Compliance with global regulations

No Default Password

  • IoT device with the private key rather than the default password

Main Benefits and Differentials for the Companies

1

Zero Toutch

Configuration made simple, remote and automatic

2

Protecting against Hacking

Protecting IoT devices against hacker attacks like DDoS, unauthorized access.

3

Regulatory Compliance

Compliance their products according to IoT security regulatory policies

4

Remote Secure Management

Device remote secure management through secure access

5

Remote Secure Management

Device remote secure management through secure access

6

Credential protection

Configuration made simple, remote and automatic

7

No Default Password

Protecting IoT devices against hacker attacks like DDoS, unauthorized access.

8

Scalable and Manageable

Distributed architecture, grow consistently, manage and update software versions

9

Passwordless Authentication

Guarantee of authenticity access trough Strong Authentication

10

Secure Data Collection and Storage

Safe storage and collection

Main Benefits and Differentials for the Companies

1

Zero Toutch

Configuration made simple, remote and automatic

2

Protecting against Hacking

Protecting IoT devices against hacker attacks like DDoS, unauthorized access.

3

Regulatory Compliance

Compliance their products according to IoT security regulatory policies

4

Remote Secure Management

Device remote secure management through secure access

5

Remote Secure Management

Device remote secure management through secure access

6

Credential protection

Configuration made simple, remote and automatic

7

No Default Password

Protecting IoT devices against hacker attacks like DDoS, unauthorized access.

8

Scalable and Manageable

Distributed architecture, grow consistently, manage and update software versions

9

Passwordless Authentication

Guarantee of authenticity access trough Strong Authentication

10

Secure Data Collection and Storage

Safe storage and collection

IMREDD - Innovation and Partnerships Institute

The mission of IMREDD is to stimulate partnerships with the economic world that generate research, to create initial and continuous education programs and to promote expertise and innovation in companies at the service of economic development and job creation in the territory.

Reference Center
“Smart territory, risk management and prevention”

IoT Global Challenge

By 2025, it is expected that there will be more than 30 billion IoT connections,  almost 4 IoT devices per person on average and that also amounts to trillions of sensors connecting and interacting on these devices.

Source: IoT Analytics, 2020

“IoT Security Market Size 2025: $9.8Bi | CAGR 29.7%”

Source: Gran View Research, Inc, 2020

The global IoT market was worth over $150 billion in 2018 and is expected to exceed $1.5 trillion by 2025.

Source: IoT Analytics, 2020

By 2023, 10% of managed Internet of Things (IoT) worldwide connectivity will be provided through hyperscale cloud providers, up from  less than 1% in 2019.

Source: Gran View Research, Inc, 2020

IoT Regulatory Trends

IoT Security Trends

  • Security is a major concern for the IoT industry
  • Agent solution is good and allows secure remote management
  • Solutions with remote access must pay attention to privacy laws and regulations
  • Although conservative, IoT tech leaders are considering SaaS management solutions
IoT security demands some basic controls, such as:
No default passwords
Mechanism for secure remote software updates
No hard-coded Credentials
Secure Communications
Users must be able to manage and delete personal data
Mechanism to report vulnerabilities
Outrage Resilience
Ensure supply chain Integrity (hardware & Software)
Start Device Test

Privacy Policy

© 2021 Sikur. All rights reserved