Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 14 of 32

15 LEARN MORE 1. In addition to strong data encryption and limiting data communications to the minimum needed for proper operations so that unwanted access will be more difficult, you can design the device to simulate a different kind of hardware so that from the outside, the device will be unrecognizable. 2. One factor that complicates the creation of secure IoT devices for a global market is the many different regulatory environments. Some regulations require certain data protections, while others limit the strength of encryption you are allowed to use. IVAN FUMAGALLI Project Manager, Robertshaw The OPTIGA™ Trust M is a high-end security solution that provides an anchor of trust for connecting IoT devices to the cloud, giving every IoT device its own unique identity. OPTIGA™ Trust M offers a wide range of security features, making it ideal for industrial and building automation applications, smart homes, and connected consumer devices. The turnkey set-up with full system integration minimizes design, integration, and deployment effort. OPTIGA™ Trust M KEY POINTS

Articles in this issue

Links on this page

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy