Identity & Access Management , Multi-factor & Risk-based Authentication , Security Operations
Applying Security to Verify Deployed Products are Authentic
Today, IoT device makers face a rising tide of security threats – from botnets, compromise of end user data, IP theft, counterfeit products, etc.
One of the hardest security processes to defend is authentication, which can be used to detect counterfeit products as well as to support end user convenience by allowing secure touchless commissioning of new products into a trusted network. Strong authentication also makes a system more resistant to “man-in-the-middle” attacks. The security feature that supports product authentication is a customized Secure Identity.
Join this session by Silicon Labs to better understand the concept of Secure Identity, how it works and how it can be customized and used to support various authenticity-related use cases - including anti-counterfeit and streamlined commissioning. Also watch a demo of the Secure Identity customization workflow.