Wednesday, 26 August 2015 01:02

Symantec plans IoT security platform


Symantec has announced its plans to make it easier for Internet of Things vendors to keep their products secure.

Symantec's security products and services already help secure around one billion devices including medical systems, set top boxes and ATMs, Symantec security expert Nick Savvides told iTWire.

While these capabilities have not been offered in a form that is easily consumable by the growing Internet of Things (IoT) industry, that's about to change as Symantec is preparing to announce a platform that can provide end-to-end protection and provide the company with telemetry about any attacks.

Symantec will also offer advice to vendors about best security practices. Startups don't always give enough attention to security and their developers don't always understand the nature of modern attacks, so the current situation is "problematic," Savvides said.

And while some development platforms are more secure than others, developers often use libraries that may present certain security risks.

So Symantec is working with organisations at multiple levels of the industry, from chip providers such as Texas Instruments (if root keys are embedded in the hardware, they can't be changed by possibly malicious software), through to the developers of the software that powers IoT devices.

The benefits of this approach include the ability to ensure that only trusted updates are installed on the devices, that data flowing to and from the device has not been tampered with in transit, and that communication is occurring with the intended party.

"Security will be the new battleground for these devices," Savvides said. For example, vendors may try to distinguish themselves from the competition by delivering updates quickly and easily, but for that to be successful customers will "need to trust the automation."

Symantec's Embedded Critical Systems Protection provides developers with a way of hardening the base operating system and the applications running on the device through mechanisms including memory protection and application whitelisting. If memory corruption or other anomalous behaviour is detected it gets shut down, and attempts to introduce unauthorised software will fail. There are also mechanisms to check the the identity of data sources such as sensors, and that the data they provide has not been altered, whether communication is across the internet or between a vehicle's onboard components.

The company plans to extend this function with telemetry and analytics to provide warnings when something out of the ordinary occurs.

While many of these functions are already available, Savvides said Symantec's plan to make them all available via a single cloud platform will make it easier and cheaper for vendors to take advantage of them.

Depending on the type of device and the functionality required, the cost could be as little as cents rather than dollars per device, he said. "It would be a very small incremental cost."

Symantec Embedded Security for Critical System Protection, IoT Device Certificates for Authentication, and IoT Code Protection are all available. The IoT Platform and IoT Security Analytics are expected sometime before the end of March 2016.

Read 5577 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Stephen Withers

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News