The autonomous security platform is designed to enable IoT devices to manage security and data privacy without human oversight. The company says that it is the first independent software vendor to bring Crypto Agility to PSA Certified Level 1 – a key enabler for Autonomous Security.
“NXM Autonomous Security is about simplifying and automating security to enable machines to defend themselves,” says Scott Rankine, CEO, NXM. “It frees OEMs to focus their resources on building new products secure in the knowledge that their brand reputation and customer’s privacy are protected.”
The company says it leverages the advanced security features of Arm-based chips to deliver scalable solutions that automate device onboarding and data versatility at the chip level, dramatically reducing the cost of deploying AI solutions and unlocking new recurring revenue opportunities.
To ensure data privacy, NXM automatically bifurcates machine-generated data from personally identifiable information, giving the OEM the option of storing data in compliance with privacy regulations, including GDPR and California’s new IoT security law. In the rare event that a device’s security is ever compromised, the system can reset a device’s encryption keys allowing the device to resume normal operation with restored security.
This same technology platform, says the company, will be capable of protecting devices against rapidly evolving cyber threats from future quantum computers.
The company demonstrated its platform using distributed ledger – i.e., blockchain – and agile crypto technologies secured by Arm TrustZone technology on an STM32 L5, Cortex-M33 based chip from STMicroelectronics combined with Microsoft’s Azure IoT Hub. A second demonstration featured quantum-safe encryption enabled by the ISARA Radiate Quantum-safe Toolkit and provided through NXM’s Agile Crypto microservice on a M33-class board.
Quantum-safe security ‘breakthrough’ for existing computers, IoT devices
Blockchain IIoT security platform gets backing from GE, others
Protecting IoT devices from cyberattacks: A critical missing piece