If we can safeguard a surgical implant, we can safeguard anything
Imagine a device that performs a "mission critical" function. On the one hand, it's durable and complex. On the other, it's a delicate assemblage of form, function, connectivity, and security. Perhaps none more important than the latter.
Our cybersecurity software stack for IoT applications provides immunity against a variety of attacks. It's the definitive answer to securing safety-critical applications – from surgical implants, to drug delivery pumps and beyond.
We include all necessary components for communications and control between smartphones and the cloud, and to and from IoT devices. Other key elements include:
Smartphone operating system security that extends across the app and platform.
IoT device security and key management.
Over-the-air upgrades for IoT devices.
The key elements of IoT protection – and how we address them
The Chain of Trust
Trust at the loT Edge
Thirdwayv adds trust and reliability to secure, peer-to-peer connectivity. Unlike others, we begin with the hardware, which serves as the nucleus of trust and security. And which informs the rest of the chain:
Trust begins at the core - the hardware
By establishing our "nucleus of trust" at the hardware level, we:
Bar counterfeit products from the IoT network.
Combat unauthorized device provisioning.
Prevent the use of fraudulent authentication certificates.
How it’s done
Only the Thirdwayv HSM can authorize an OEM device to become a trusted entity on the network, under control of the Thirdwayv cloud.
By controlling all device programming and final test during manufacturing, we prevent unauthorized provisioning that can result from overbuilding in the supply chain.
We ensure secure device-to-device and smartphone-to-device wireless links. We do it by managing all keys and certificates so, when IoT displays and devices are on-boarded, they're already pre-programmed to interact only with OEM-approved gateways in the field.
With hardware as the foundation for security, you're protected at every touchpoint across the solution.
Trusted mobility - smartphone control
We eliminate the smartphone as an IoT threat vector by adding trust to:
The user interface.
The mobile operating system execution.
The app connecting it to OEM devices.
How it’s done
All user input/outputs are validated so they can't be compromised by any other apps on the smartphone. A combination of trusted execution and smart partitioning ensures no other app can eavesdrop. Or otherwise influence the OEM's application.
The Thirdwayv Trusted App Manager ensures that only privileged smartphone apps may connect with the OEM's IoT devices.
With the most vulnerable threat vector neutralized, you keep customers easily connected - and hackers left in the cold.
Trusted IoT gateways
We cut the expense of "anytime/anywhere" coverage. Traditional solutions use either fixed cellular or WiFi gateways to maximize coverage and availability. Or they rely exclusively on cellular solutions.
How we're different
Unlike others, we use the smartphone as a soft gateway, alongside traditional fixed gateways. We employ each opportunistically where it's most cost-efficient.
Local store/forward capability reduces spotty network coverage. And a wireless wakeup feature in soft gateway mode ensures that device data moves to the cloud — regardless of whether the phone is in sleep mode or the mobile app has been closed.
Since this requires no user action, users don't have to worry about authentications in the absence of cloud connectivity.
With our IoT gateways, you simultaneously save money, improve connections, and create a seamless customer experience.
We protect all devices, nodes and other endpoints from unauthorized control, usage, and data access.
Selective pairing ensures that devices are only used for their intended purpose.
Secure connectivity prevents Man in the Middle (MITM) attacks. It also thwarts other attempts by dedicated hardware or rogue smartphone apps to access / replay device contents.
Secure, over-the-air firmware upgrades protect end-point integrity from bugs that are discovered after the device has left the factory.
Thirdwayv takes a security by design approach to protecting cloud operations, with a distributed root of trust that ensures no single point of system failure.
We manage keys and certificates to prevent scalable attacks. This includes "break one, break all" scenarios that start with a device or gateway and then threaten the entire system.
The Thirdwayv Authentication Server delivers trusted execution with smart partitioning. It's isolated from the rest of the system to resist the onslaught of fraudulent authentication requests from a distributed denial of service (DDoS) attack.
In cases where server resources are shared, we isolate all key server modules from other apps that might compromise trusted cloud execution.
How secure is your solution?
With more than 100 collective years of experience on our leadership team, we have the deep expertise and forward-vision to keep you protected. Why not complement your existing knowledge base with ours?
Put fresh eyes on what you're developing to shore potential security gaps.
Find out the most common security mistake even the savviest enterprises make — and how to immediately fix it.
Learn what we believe are the three biggest threats that will soon emerge in loT connectivity — and what you can do to mitigate the threat right now.