PRODUCTS & TECHNOLOGY
Newest Embedded Technology Used by Industry Leaders
Security Management for IoT, Industrial Control, Medical, Smart Grid and DoD Devices
Page 1 of 1
A security management software suite that is specifically designed to protect IoT and embedded devices against cyber-attack can be operated as either an on-premise or a cloud-based security manager. The Floodgate Security Manager from Icon Labs provides device status monitoring, security policy management, command audit logging, and security event logging and reporting for devices running Icon Labs’ Floodgate Agent or other lightweight IoT management protocols such as COAP and MQTT. Floodgate Security Manager provides comprehensive reporting and auditing capabilities to help achieve EDSA Certification, ISA/IEC 62443 Compliance, and/or compliance with the NIST Cybersecurity framework.
The current approach to security management for IoT devices is to repurpose legacy security management systems. While this solution works for some IoT gateways and other large IoT devices, it does not scale to the smallest IoT devices, especially small battery powered edge devices and sensor solutions. Floodgate Security Manager is designed to provide the management services required by all IOT devices, including small, battery powered and mobile devices without the overhead and complexity of traditional enterprise security management systems.
Icon Labs products provide embedded security for IoT and Machine to Machine (M2M) solutions such as aerospace, military and space probes, industrial and medical control devices, medical systems, and consumer electronics products. The Floodgate Security Framework provides a “defense in depth” solution that protects control units and endpoint devices from cyber threats, aids in compliance with regulatory mandates and guidelines, and gathers and reports command, event and device status information for audit requirements.
Des Moines, IA