Wednesday, 26 August 2015 01:02

Symantec plans IoT security platform


Symantec has announced its plans to make it easier for Internet of Things vendors to keep their products secure.

Symantec's security products and services already help secure around one billion devices including medical systems, set top boxes and ATMs, Symantec security expert Nick Savvides told iTWire.

While these capabilities have not been offered in a form that is easily consumable by the growing Internet of Things (IoT) industry, that's about to change as Symantec is preparing to announce a platform that can provide end-to-end protection and provide the company with telemetry about any attacks.

Symantec will also offer advice to vendors about best security practices. Startups don't always give enough attention to security and their developers don't always understand the nature of modern attacks, so the current situation is "problematic," Savvides said.

And while some development platforms are more secure than others, developers often use libraries that may present certain security risks.

So Symantec is working with organisations at multiple levels of the industry, from chip providers such as Texas Instruments (if root keys are embedded in the hardware, they can't be changed by possibly malicious software), through to the developers of the software that powers IoT devices.

The benefits of this approach include the ability to ensure that only trusted updates are installed on the devices, that data flowing to and from the device has not been tampered with in transit, and that communication is occurring with the intended party.

"Security will be the new battleground for these devices," Savvides said. For example, vendors may try to distinguish themselves from the competition by delivering updates quickly and easily, but for that to be successful customers will "need to trust the automation."

Symantec's Embedded Critical Systems Protection provides developers with a way of hardening the base operating system and the applications running on the device through mechanisms including memory protection and application whitelisting. If memory corruption or other anomalous behaviour is detected it gets shut down, and attempts to introduce unauthorised software will fail. There are also mechanisms to check the the identity of data sources such as sensors, and that the data they provide has not been altered, whether communication is across the internet or between a vehicle's onboard components.

The company plans to extend this function with telemetry and analytics to provide warnings when something out of the ordinary occurs.

While many of these functions are already available, Savvides said Symantec's plan to make them all available via a single cloud platform will make it easier and cheaper for vendors to take advantage of them.

Depending on the type of device and the functionality required, the cost could be as little as cents rather than dollars per device, he said. "It would be a very small incremental cost."

Symantec Embedded Security for Critical System Protection, IoT Device Certificates for Authentication, and IoT Code Protection are all available. The IoT Platform and IoT Security Analytics are expected sometime before the end of March 2016.


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.



Recent Comments