Request demo


How to Build End-to-End IoT Device Security at Scale

Connected things include a variety of IoT endpoint devices across several critical infrastructure segments, including utilities, automotive, healthcare, retail, and building automation. Complex manufacturing supply chains make it difficult to build electronic devices that can be trusted – forcing security to be bolted on as a feature rather than being a critical element designed at the start of a product’s lifecycle.

By adopting a Zero Trust approach, IoT manufacturers can ensure device trustworthiness and security at scale through their product's end-to-end lifecycle.

In this panel with device security experts, discussion topics will include:

  • How businesses can gain a competitive advantage by embedding security in the devices they manufacture
  • Regulations relating to IoT security that manufacturers should be aware of
  • Where secure crypto fits into the product design and lifecycle process
  • Common IoT device security challenges that require a zero trust manufacturing approach

Device security experts in this panel include:

  • Ted Shorter, Co-Founder & CTO at Keyfactor
  • Ellen Boehm, VP of IoT Strategy and Operations at Keyfactor
  • Kim Bybjerg, VP/Head of Continental Europe at Tata Communications & Chairman of IMC (IoT M2M Coucil)
  • Paul Hampton, Senior Product Manager, Thales

Recommended Content


How to Provision & Manage Your IoT Device Identities with Keyfactor Control

Join this on-demand demo as Ellen Boehm, Director of IoT Product Management at Keyfactor, does a hands-on demo of Keyfactor Control’s unique ability to secure your IoT Devices.


Navigate Complex Supply Chains to Build Trusted IoT Devices

In this whitepaper, learn how a "zero trust" approach—designing security into devices while maintaining effective security controls throughout the process and product life cycle—ensures the safety of your devices from the production floor to the end-user.


Design and Build Secure IoT Devices at Scale.

Tight budgets, hardware constraints and complex IoT supply chains make it hard to build strong security into devices at scale. But when safety and security are at stake – it has to happen. With Keyfactor Control, device manufacturers can easily and cost-effectively embed identity into their connected devices at any scale.