15
LEARN MORE
1. In addition to strong data encryption and limiting data
communications to the minimum needed for proper
operations so that unwanted access will be more difficult,
you can design the device to simulate a different kind of
hardware so that from the outside, the device will
be unrecognizable.
2. One factor that complicates the creation of secure IoT
devices for a global market is the many different regulatory
environments. Some regulations require certain data
protections, while others limit the strength of encryption
you are allowed to use.
IVAN FUMAGALLI
Project Manager, Robertshaw
The OPTIGA™ Trust M is a high-end security solution that
provides an anchor of trust for connecting IoT devices to
the cloud, giving every IoT device its own unique identity.
OPTIGA™ Trust M offers a wide range of security features,
making it ideal for industrial and building automation
applications, smart homes, and connected consumer devices.
The turnkey set-up with full system integration minimizes
design, integration, and deployment effort.
OPTIGA™ Trust M
KEY POINTS