secure iot - wordpress.com · 2017. 8. 1. · how secure iot works once an abnormality is detected,...

2
Trustlook SECURE IoT revolutionizes IoT security with a custom, embeddable engine built on artificial intelligence. SECURE IoT is a device-behavior-based solution that detects threats that existing perimeter and network-based products fail to stop. Now smart cars, thermostats, critical industrial sensors, and millions of other connected devices can be built with security on embedded device security POWERED BY ARTIFICIAL INTELLIGENCE POST-BREACH DEFENSE OFFLINE EMBEDDED ENGINE ARTIFICIAL INTELLIGENCE COMPATIBILITY “Guard inside the castle” model works after the attacker has root access. Works completely offline without the need for a network connection. Continuous machine learning of suspicious device behaviors across IoT devices. Works with any IoT device running embedded Linux. KEY FEATURES & BENEFITS the inside, and take advantage of Trustlook’s powerful artificial intelligence technology. ai To learn more, please contact [email protected] Fine grain kernel-level monitoring of system calls, network and device resources. MONITORS DEVICE BEHAVIORS SECURE IoT ai ai

Upload: others

Post on 22-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURE IoT - WordPress.com · 2017. 8. 1. · HOW secure iot WORKS Once an abnormality is detected, SECUREai IoT will stop the threat and send an alert 97 E. Brokaw Rd. Ste. 150 San

Trustlook SECURE IoT revolutionizes IoT security with a custom, embeddable engine built on

artificial intelligence. SECURE IoT is a device-behavior-based solution that detects threats that

existing perimeter and network-based products fail to stop. Now smart cars, thermostats,

critical industrial sensors, and millions of other connected devices can be built with security on

e m b e d d e d d e v i c e s e c u r i t yP O W E R E D BY A R T I F I C I A L I N T E L L I G E N C E

POST-BREACH DEFENSE

OFFLINE EMBEDDED ENGINE

ARTIFICIAL INTELLIGENCE

COMPATIBILITY

“Guard inside the castle” model works after the attacker

has root access.

Works completely offline without the need for a

network connection.

Continuous machine learning of suspicious device

behaviors across IoT devices.

Works with any IoT device running embedded Linux.

KEY FEATURES & BENEFITS

the inside, and take advantage of Trustlook’s powerful artificial

intelligence technology.

ai

To learn more, please contact [email protected]

Fine grain kernel-level monitoring of system calls,

network and device resources.

MONITORS DEVICE BEHAVIORS

SECURE IoTai

ai

Page 2: SECURE IoT - WordPress.com · 2017. 8. 1. · HOW secure iot WORKS Once an abnormality is detected, SECUREai IoT will stop the threat and send an alert 97 E. Brokaw Rd. Ste. 150 San

IOT PROTECTION AGAINST ZERO-DAY THREATS

HOW secure iot WORKS

Once an abnormality is detected, SECUREai IoT will stop the threat and

send an alert

97 E. Brokaw Rd. Ste. 150 San Jose, CA 95112

[email protected]@trustlook

Zero-day Exploit BypassesTraditional Security Measures

Firewall IntrusionPrevention

System

A SECURE IoT device driver monitors hundreds of system calls and network resources to detect anomalies

ai

ATTACKER GAINS ROOT ACCESSCan now modify data, device, and network settings

ai

Starting From Root BreachSECUREai IoT works at the device level. It pro-tects an IoT device from the inside. The solution assumes that an attacker already has root access, and monitors the device behavior that happens after root access. Because “root” is the starting point, SECUREai

IoT can catch malicious activity that has made it past other forms of protection.

Why is it Important?Traditional cybersecurity measures are not sufficient to protect the IoT. Stuxnet, Mirai, the Target data breach and many other con-sumer and industrial IoT attacks bypassed existing cybersecurity measures. What works in some computing environments won’t nec-essarily work with the IoT. The various func-tionalities and limited processing power of IoT devices means that a new and unique approach is required.

How is it Implemented?IoT security must be designed from the start to realize its full potential. It can’t be bolted on, and it can’t be overlooked during product development. SECUREai IoT is a lightweight software solution customized to each device to provide the highest level of security.