Covata’s key as a service aims to sort out IoT security
Security firm Covata has announced its ‘key as a service’ (KaaS) offering is to be initially deployed with Cisco as its partner.
The product aims to remove the inconvenience of encryption key and access policy management via patent pending techniques such as key fragmentation and GeoLoc. The solution will also provide protection against impending legal and regulatory challenges.
Cisco is set to deploy Covata’s new ‘Key-as-a-Service’ (KaaS) offering in a number of IoT and cloud projects that will embed the service into the customer products. Covata KaaS provides a scalable and bespoke structure to secure content at any location while backing policy driven access and facilitating complete access remediation. Its patent pending Geo Location process changes the focus from control of data to control of the location of the encryption keys.
KaaS comes with an open standard to facilitate protection in the background with minimal overhead. The policy releases a key when access is requested within the data sovereignty jurisdiction. The data never flows through the key server as it remains encrypted on the device and only the authorised intended recipient can decrypt it. This also ensures a full audit trail for compliance. A company may also utilise the geo-policy to block any keys being issued to data that is not physically within a specific countries borders.
Covata KaaS also ensures key fragmentation as the master key is fragmented and then delivered to four different data custodians; within Covata KaaS, the government or duly authorised agent of the government from where the generating key service resides, tenancy owner or its nominated escrow agent, and the auditing firm of the Covata KaaS.
Interested in hearing industry leaders discuss subjects like this and sharing their IoT use-cases? Attend the IoT Tech Expo World Series events with upcoming shows in Silicon Valley, London and Amsterdam to learn more.
- » Verizon teams up with Sequans to fast-track commercial deployments of IoT connected devices
- » Seven in 10 companies know of hacks against their IoT devices, research finds
- » Opinion: Data isn’t the new oil – with IoT, it will be much bigger
- » Securing IoT applications for the next era of industry: An important challenge – and opportunity
- » The time is now: How to manufacture your smart factory with Industrial IoT