Demo Free trial Request quote Contact me

IoT (Internet of Things)

IoTs (Internet of Things) devices and platforms are a growing security risk with the escalating number of deployments and development of devices and software solutions related to the delivery of IoT. The risk of IoT being exposed are both related to the scale of the deployments, from hundreds to millions of devices globally, to the platforms and the devices themselves. Some of the challenges with IoTs concerns outdated hardware and software, as many devices are not update enough and are vulnerable to data leaks.

IoT platforms and the software related to IoT deployments tend to be built up by components that are already in use in other non-IoT related cases. Holm Security have worked, from the early days, to provide a solution in Security Center that covers the need that IoT requires from a vulnerability management solution.

Powerful features

Security Center provides an easy to use asset management that offers a flexible structure through dynamic and static tags, that lets you keep a track of all your IoT assets with powerful search filtering and risk overview. Vulnerabilities are identified through signatures that are updated on a daily basis to cover the most recent vulnerabilities that a system can be exposed to.

MQTT is a very popular and lightweight protocol to build IoT implementations for mobile devices and embedded systems. AMQP is heavier variant offering more advanced features compared to MQTT. These are two examples of common protocols. Others are Websockets, RTC and HTTP(s) using RESTful APIs. Security Center covers many layers of software implementations that are common within IoT platforms and their deployments.

Applications

Here are a few examples of software that are very common within IoT that Security Center covers:

Application Servers
  • Nginx
  • Apache HTTP Server
  • RabbitMQ
  • Apache ActiveMQ
  • IBM Websphere MQ
Database Software
  • MySQL
  • MariaDB
  • PostgreSQL
Programming Languages
  • PHP
  • NodeJS
  • Python
Operating Systems
  • Linux (Debian, Redhat, Fedora)
  • Windows
Software
  • Docker
  • Kubernetes


Our solution

This is how we help your organization meet the challenges that IoT entails.

Challenge:
Solution:
Description:
Remediate vulnerabilities in IoT devices
Vulnerability Manager
Information and tools for solving vulnerabilities in networks and systems, as well as web applications.
Systematic assessment of IoTs devices
Security Center
Security Center can cover several layers of software implementation, common within IoTs platforms and deployments.
Keep track of all IoT assets
Asset Management
Create a flexible structure with dynamic and static tags.