Three years ago, in March 2015, Digital.Security made the choice of developing an expertise on IoT security. If we had clearly identified the links of adherence between IT and IoT security, we had confirmation that the implementation of IoT security requires to think about new approaches, techniques and methodologies.
Cost limits, involving real energy and computing power rationing, combined with the rapid time-to-market of the IoT market, forced us to think differently, from the risk analyses that had to propose realistic recommendations to safety assessments that took into account dozens of technologies at very different stages of maturity.
Our assessment? It is reasonably possible to integrate security into a connected solution, and we will soon be pleased to offer to IoT manufacturers the benefit of their security efforts through our IoT security label, the result of three years of reflections, studies and security analyses.