Secure your IoT devices
Don't leave your IoT devices vulnerables against firmware tampering or take-over
Keep Your IoT firmware updates secured
As connected devices continue to increase in number, it is increasingly challenging for enterprises to secure them and keep threats at bay. Fraught with vulnerabilities and offering an attack surface ripe for security breaches, IoT devices are attractive targets for cybercriminals. Whether enterprises are just starting out with IoT adoption or looking to expand their established IoT networks, all face similar challenges when it comes to managing, monitoring and securing their connected IoT environments. To successfully secure IoT devices, there are a few things enterprises should consider
- Continue to Patch and Update Firmware When Available
- Actively Monitor IoT Devices at All Times
- Adopt Secure Password Practices
- Apply Network Segmentation for Stronger Defense
DuoKey help us to safeguard and protect all our connected vehicule with end-to-end secured Over the Air firmware update with keys protected using Multi-Party Computation
Domain After-Sales Architect
Secure communication with your IoT using our ZeroMQ MPC encryption
CurveZMQ is a protocol for secure messaging across the Internet that closely follows the CurveCP security handshake. CurveZMQ aims to provide the same level of security as CurveCP. That is, it aims to prevent eavesdropping, fraudulent data, altered data, replay attacks, amplification attacks, man-in-the-middle attacks, key theft attacks, identity attacks, and certain denial-of-service attacks.
Protect your keys with MPC
CurveZMQ uses the Curve25519 elliptic curve, which was designed by Daniel J. Bernstein to achieve good performance with short key sizes (256 bits). The protocol establishes short-term session keys for every connection to achieve perfect forward security. Session keys are held in memory and destroyed when the connection is closed. They are exchanged during the handshake and are used to encrypt every messages MESSAGE between Client and Server. CurveZMQ also addresses replay attacks, amplification attacks, MITM attacks, key thefts, client identification, and various denial-of-service attacks.
Clients and servers have long-term permanent keys, and for each connection, they create and securely exchange short-term transient keys. Each key is a public/secret keypair, following the elliptic curve security model.
With DuoKey we replace long-term private keys by MPC keys (i.e., no stored in memory anymore)
- Avoid long-term keys leakage as they never exist in clear format
- Do not need or trust a HSM to store your long term keys
- Support fast ECDH key exchange
- REST-API or SDKs that can be integrated to your custom ZMQ