https://store-images.s-microsoft.com/image/apps.41202.4541bde3-c48e-4a59-90fe-fad05dd70f44.975438c5-c9bf-470f-b051-4ee952b1a887.7eedce94-6028-473a-971e-7d8d1c0f1957

Sikur Connect

avtor: SIKUR

A method for securely connecting and managing IoT devices and networks

Sikur Connect solves some of the most critical issues in the IoT realm, delivering device authentication, authorization, and access control through simple and efficient mechanisms, ensuring privacy and protecting against the most common attacks. IoT devices in automotive industries, agriculture, mining, steel mills, power systems, health systems, and many more can eliminate security risks and comply with regulations.


MAIN FEATURES: Identity Management, Authentication, Zero Touch, Secure (Tunnel, Storage, Data Collection), Device Management, Auditing, and Compliance. 100% cloud solution, providing credential protection to avoid unauthorized sharing, secure and password-less authentication through the user's private/public key.

MS Azure cloud capabilities and availability support the product to deliver compliance and information privacy regulations, like GDPR in Europe. 


HOW WE MANAGE SECURITY? Market solutions rely on firewalls for border protection, which loses its effectiveness as time goes by. The username/password are fading out, and Sikur Connect ensures a proper and safe authentication process. Avoiding the default device password puts the solution in compliance with regulations to come while managing and controlling IoT devices without leaving breaches to the external attackers. Its secure tunneling technology makes device management safe at once.


IDENTITY SPOOFING: The attacker uses a false identity, communicating with the IoT device on behalf of a legitimate entity.

EAVESDROPPING: The interception of electronic communication, which happens because IoT devices often use public communication infrastructure.

DATA TAMPERING: The unauthorized alteration of data, which can occur in the IoT device or when it is exchanging data with the network.

AUTHORIZATION/ACCESS CONTROL: The attacker gains access to the device and then manipulates it or the network.

PRIVACY: The attacker uses private data hosted in the IoT device to explore them for unknown/unauthorized reasons.

INTEROPERABILITY AND GATEWAYS: As several IoT devices don’t communicate using TCP/IP, but other protocols, gateways, and other communication processes come to the network, and these are open-doors for attackers.


Hiter pregled

https://store-images.s-microsoft.com/image/apps.56412.4541bde3-c48e-4a59-90fe-fad05dd70f44.975438c5-c9bf-470f-b051-4ee952b1a887.c3d27e16-1fa8-421f-a660-26be2e9e6f1b
/staticstorage/linux/20241105.1/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.60087.4541bde3-c48e-4a59-90fe-fad05dd70f44.975438c5-c9bf-470f-b051-4ee952b1a887.18fef37e-d6e0-4f5d-adec-c5616d0bab76
/staticstorage/linux/20241105.1/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.53666.4541bde3-c48e-4a59-90fe-fad05dd70f44.975438c5-c9bf-470f-b051-4ee952b1a887.378d6ab9-0d96-42a4-aed3-03fb6b7d845c
https://store-images.s-microsoft.com/image/apps.21759.4541bde3-c48e-4a59-90fe-fad05dd70f44.975438c5-c9bf-470f-b051-4ee952b1a887.a6cbf7e0-0db5-4c7f-9059-021413d32173
https://store-images.s-microsoft.com/image/apps.38351.4541bde3-c48e-4a59-90fe-fad05dd70f44.975438c5-c9bf-470f-b051-4ee952b1a887.f571bc6b-5ac9-4dd9-936e-e60102f54e93
https://store-images.s-microsoft.com/image/apps.1594.4541bde3-c48e-4a59-90fe-fad05dd70f44.975438c5-c9bf-470f-b051-4ee952b1a887.078a572a-dd69-47c1-b36f-3162add7be2a