News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Gartner ranks Druva #1
in overall product rating for enterprise endpoint backup
for the second year in a row!
You are here: Home / Press Releases / Taking Control of Digital Security
Is your endpoint data protected?
Taking Control of Digital Security with Turnkey Platform
Taking Control of Digital Security with Turnkey Platform
News as reported by the company Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
AUGUST
28
2013



August 28, 2013 -- Companies can now secure their digital links with Trusted Source™ -- a new, cost-effective, easy-to-implement turnkey platform devised by product development firm Cambridge Consultants. It's an efficient way of allowing brand owners to give each of their products -- even low-cost ones -- a unique digital identity before they leave the manufacturer's production line. This kind of secure identification is becoming more important with the growth in "smart" devices which rely on being able to connect securely to digital services such as healthcare apps.

As well as supporting this move towards the "Internet of Things", Trusted Source™ also enables digital security for a wide range of applications. These include coding for anti-counterfeiting and brand protection, establishing secure links for track-and-trace applications as well as smart devices, and simplifying wireless connection set-up.

Low-cost security techniques increasingly require sending secrets between a digital end point -- whether it's a factory testing station or a smartphone -- and a brand owner's database, often using untrusted internet connections. Cambridge Consultants has developed a turnkey solution which deploys the relevant key management software to both ends of a digital link, establishing end-to-end security from an enterprise data server to any number of business partners or devices including remote factories or suppliers.

The technology could be used to exchange data with a factory floor to retrieve anti-counterfeit codes, for example, or to monitor yield or output data. In a healthcare context it could be used to meet pharmaceutical packaging serialization regulations or for the secure exchange of clinical trials data. In mobile security, the technology could enable an end-to-end connection directly to the secure components in a smartphone -- and in "smart metering" and "smart home" environments it could be used for security "personalization" of devices.

"We developed Trusted Source™ because the end-to-end solutions we've been developing across our consumer, industrial and medical programs all required this core component," said Jon Edgcombe, leader of the software technologies group at Cambridge Consultants. "The traditional one-size-fits-all model for issuing digital certificates --generally used for one-way authentication on a web browser -- isn't the right tool for connected devices and online factories, which have fundamentally different security requirements.

"With product companies starting to run more digital services and becoming more capable of controlling their own roots of trust and security model, there are clear advantages to being able to customize your digital security to your needs. Our technology enables companies to have the tools and capabilities to control their own data flows, helping them comply with increasing privacy regulations, while increasing support for low-power devices as well as the variable quality internet connections often found in factory environments"

The Trusted Source™ system is typically integrated as part of a Cambridge Consultants product development. It provides a company with a pre-packaged Certificate Authority server system, software and hardware token components which can be issued to third-party factories for easy installation -- plus optional integration of a serialization module for identity issuance. This set-up gives overall control of security and operational cost savings to the brand owner, compared with the alternative of outsourcing to a third-party certificate provider, and then auditing and securely integrating with a factory's own IT system.

"As digital tasks become more complex, sending data securely between product locations is increasingly important to our clients, especially those supporting multiple factories producing millions of devices," said Edgcombe. "This design platform simplifies setting up secure links, whether for anti-counterfeit brand protection or enabling secured digital services. We can host the server side for smaller deployments -- which a number of our clients find beneficial when piloting a new connected product or digital system which needs to be secure -- or hand over the system to the client for full-scale deployments."

The design uses well-established security algorithms that can be implemented across a wide range of industries. The system can either be licensed as part of a product development or customized for deployment as fee-for-service work, depending on the overall product and digital service requirements.
(continued...)

1  |  2  |  Next Page >

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical things you need to know by accessing the white paper, "5 Things You Didn't Know About Cloud Backup". Access the White Paper now.
MORE IN PRESS RELEASES
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Russian Gang with Stolen IDs Hacks Hosting Company
In August, a Russian cyber gang obtained what researchers called “the largest cache of stolen data." Now, those hackers may be putting their ill-gotten gains to criminal use.
 
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 

Enterprise Hardware Spotlight
AMD's New FX Series CPU Breaks Processing Speed Record
The new FX-8370 processor from Advanced Micro Devices has set a record for silicon processor speed, the company announced. Overclocked, the eight-core chip was measured at 8722.78 MHz.
 
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 

Mobile Technology Spotlight
Rumor Mill Puts Mobile Wallet in iPhone 6
Apple is moving toward the mobile wallet world with its next iPhone. The tech giant has partnered with retailers, banks and major payment networks to make it happen, according to Bloomberg.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech | Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.