www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...

Next-generation security for the IoT & IIoT

by Clive Maxfield - Embedded, Sept. 01, 2015 – 

Cybercriminals are constantly discovering new ways to exploit the growing Internet of Things (IoT) and Industrial Internet of Things (IIoT). Traditional cybersecurity solutions rely on techniques like signatures and repeated updates, which means they are difficult to integrate and they cannot secure IoT systems and devices effectively. For example, conventional solutions simply cannot cope with zero-day (or zero-hour) attacks. (A zero day/hour vulnerability refers to a security hole in software that is unknown to the vendor and that can be exploited by hackers before the vendor becomes aware of it.)

In order to address these issues, Webroot has introduced its IoT Security Toolkit -- a set of technologies that enables IoT solution designers and integrators to leverage cloud-based, real-time threat intelligence services from Webroot to protect deployed systems against cyberattacks.

The Webroot IoT Security Toolkit is powered by the Webroot BrightCloud Threat Intelligence Platform, a collective threat intelligence architecture that classifies and shares cybersecurity intelligence from millions of devices and sensors, and billions of Internet threats emanating from IPs, URLs, files, and mobile applications. The key point to note here is that an Internet location that is "known good" at any particular time may become corrupted and subverted only moments later. Leveraging a massive Hadoop distributed cloud computing architecture, the BrightCloud Threat Intelligence Platform scans and classifies the entire Internet universe multiple times a day in order to detect the latest cyber threats.


Click here to read more...

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.