By and with Andreas Philipp, PrimeKey
How do we realize the benefits of a totally connected world? The paradigm of the IoT focused IT industry is that in the future, everything that can benefit from a connection will be connected. We are only at the beginning of this transformation but even so, Gartner says that by the end of 2017 up to 8 billion devices will be in use worldwide.
The IoT market consists of multiple ecosystems with a high level of complexity. These ecosystems have multi-layer models with hundreds of players – from device vendor and communication service provider, down to the IoT platform software vendor and the IT service provider companies. There is also the collision of Operations Technology (OT) and Information Technology (IT) departments within the enterprises themselves.
But at the end of the day, they all have one common requirement: the demand for trust in the Devices, the Application, and the underlying Infrastructure. In order to create this and to build a bridge between the IT and OT World, there is definitely a need for a solid chain of trust, from the trustworthiness of the Devices and all the way up to Infrastructure.
In the past, it has been sufficient to protect cryptographic key material and its application, but with the new upcoming trends in IoT and Cloud, it becomes increasingly clear that this is not sufficient anymore. Rather, protection must be extended to applications, protection against manipulation, theft, copying or counterfeit. Only with this step will it be possible to build the basic trust foundations on which a stable IoT can be developed and grown.
Q: Mr. Philipp, you have just joined PrimeKey. What are your thoughts on their SEE offering?
I have been working with hardware security modules and applied cryptography for more than 20 years and was really excited when I saw the brand new SEE platform by PrimeKey on the RSA show this year. For me, it answers the questions of creating the necessary solid chain of trust urgently needed for IoT. This is ground breaking technology and I wanted to be part of it, which is why I recently decided to join PrimeKey as the Business Developer for the SEE platform.
Q: So how have the first reactions on the SEE been in the market?
Very confirming! I have found that after we’ve explained the concept of the platform to companies in different sectors and segments, they immediately start discussing ideas for development of application scenarios. This ranges from an extensive authentication solution over personalization platforms, up to the multimedia DRM system.
Knowing the security market well, and having introduced the SEE platform to companies, I am sure that the next success stories can be created by the end of the year. Keep your eyes open and you will see just how the SEE’s performance can enable the chain of trust in a growing and everchanging IoT market.
Protect your application
The PrimeKey SEE is a full-size rack-mount application server that comes with a patented FIPS protected execution environment for any operating system and application. It ensures that the server runtime environment can only be accessed by an authorized security administrator at all times, making it impossible to access, to extract or to modify by an unauthorized party. By doing so it opens up a new world of possibilities where you can run each mission-critical application in any uncontrolled environment.
Prevent software and data theft
No need to fear that someone will steal or copy your software. You can now deploy your product in places with public access or where you fear that someone would be interested in extracting your software with untoward outcome for your business. With PrimeKey SEE you can place your software wherever it benefits further advances of your business.
Prevent manipulation
If your software controls sensitive information or functionality, you know the consequences that an undetected malicious modification can have. Your IoT device might be hacked, your data compromised or your machines stop working. With SEE you can sleep soundly, as no one can access or modify your software and data.