Israeli startup to secure IoT binary code natively: Page 2 of 2

June 22, 2020 //By Julien Happich
binary code
Founded a couple of years ago, IoT security startup Sternum aims to secure the whole IoT market, irrespective of operating systems.

Once installed, the EIV sits on the device, provides insight to data, and maps all components in use. Sternum’s Real-Time Event Monitoring System (RIEMS) then monitors operation of the OS, memory usage, CPU usage, if the device uses encryption/decryption, how much data is being accessed/sent, if a device is communicating with a new/unknown IP address, and more. The monitoring system also continuously scans for and alerts on known common vulnerabilities and exposures (CVEs). This approach delivers true vulnerability-agnostic device protection. The dashboard then displays network events, cryptographic events, OS-related events and gives administrators control over prevention and response policies. Sternum integrates with most security information and event management solutions.

One key aspect in making the solution work across the broadest range of IoT devices was to keep runtime overhead in the single-digit range. The company offers an SDK tool available for download, which potential partners can use to experiment with the solution. From there, the startup operation is license-based.

Earlier this year, the company has partnered with Telit to secure it’s xE910 module family, giving customers in-depth visibility and security for their entire device fleet. The EIV will validate every operation within any IoT device where Telit’s module is installed, operating like an on-device firewall. Telit plans to offer these security enhanced modules to manufacturers of cellular-enabled products across industries, including medical, industry 4.0, smart cities and more.

Sternum - www.sternumiot.com


Vous êtes certain ?

Si vous désactivez les cookies, vous ne pouvez plus naviguer sur le site.

Vous allez être rediriger vers Google.