Search
US UK
Call us

General Enquiries

00 44 845 838 2050

Internet of Things

Information is at the heart of digital transformation. As organizations extend technology infrastructure into the world of IoT, driving automation, interaction and business intelligence, the importance of information assurance is greater than ever. Becrypt help organizations to assure the resilience and security of diverse endpoints ranging from customers and citizen facing interactive kiosks, to bespoke embedded devices.

Secure Interactive Kiosks

Interactive kiosks are allowing organizations to respond to an increasing customer and citizen desire to interact with technology, as opposed to being passive consumers of content. While delivering immediate automation and process efficiency benefits, interactive kiosks can be sources of rich and diverse information sets that allow organizations to intelligently evolve service offerings.

Becrypt helps organizations successfully deploy, manage and evolve their interactive kiosk environments using the Paradox Linux-based secure operating system and management platform. Paradox avoids the risks and complexities of attempting to lock down and manage Windows or Android, providing automated patching and configuration management of all application and operating system components.



Zero Trust for IoT

The Internet of Things presents an increasingly interconnected world of devices that connect, compute and communicate, from low-power sensor networks, to high-end devices resembling conventional IT. The increased autonomy of IoT devices increases the need for resilient systems that maintain integrity over extended periods and support device-based identity management for secure access to interconnected services.

Collaborating with the UK National Cyber Security Centre (NCSC) on the NCSC Cloud Client project, Becrypt have implemented a standards-based device identity management platform using an end to end remote attestation protocol.

Becrypt’s flagship secure Linux-based operating system provides the ideal platform for managing diverse IoT endpoints. Currently deployed in environments that range from manufacturing, aviation and military, Paradox provides a secure resilient platform for conventional IT as well as bespoke IoT endpoints and embedded systems.

Device Identity management for IoT platforms can be an essential component of system security, given the absence of user authentication, and the physical exposure of IoT systems.

As IoT extends the enterprise IT perimeter, the importance of adhering to Zero trust principles increases. Authentication of device identity, as well as the integrity of operating system and applications, should be used to determine subsequent fine-grain access to connected services.

Paradox includes certificate-based device identity management, using a hardware root of trust where available, and implements robust health measurement of device software using a standards-based remote attestation protocol.

Get in touch with Becrypt today

First name*

Last name*

Email address*

Phone number*

How can we help?*

By submitting your details you are agreeing that we may communicate with you about Becrypt.
I agree to receive marketing updates regarding relevant products and services from Becrypt. Please refer to our Privacy Policy for more information. You can unsubscribe at any time.