Secure Credentials

It simplifies the management of credentials on IoT devices.

  • SIM-based authentication
  • Life-cycle management
  • Cost reduction
  • Direct integration with AWS and Azure

What can we do for your cyber security?

It manages credentials for IoT devices by using mobile identity (SIM card) and the Telefónica network

Secure Credentials is a service designed to meet the security needs of clients by guaranteeing trust between devices and the IoT platform.

Secure Credentials complements the offer from our managed connectivity platform (KITE) that provides SIM-based mobile-specific connectivity for IoT (integrated into the IoT device itself) and adds numerous functionalities and services, guaranteeing communication security when using our own network to connect with the client’s data centre, private or public cloud environment.

Secure Credentials provides a secure identity to IoT devices, which plays a crucial role in the authentication process for the IoT platform.

ADVANTAGES AND BENEFITS OF THE SERVICE

Telefónica SIM card and network

Telefónica SIM card and network as a trust anchor for verifying the identity and integrity of IoT devices.

Life-cycle management

It simplifies the real-time management of credentials from issuance to automatic device onboarding, renewal and revocation, ensuring that connected devices are exactly what they claim to be.

Cost reduction

It reduces costs by mitigating the risks of tasks prone to error and preventing the personalisation of firmware.

Integration with PaaS

Option to automatically integrate with the IoT Core from Amazon Web Services (AWS) and the IoT Hub from Microsoft Azure. It provides a mutual identification and guarantees the integrity and traceability of transactions.

Technical characteristics

SIM- and network-based authentication.

Communication encryption at MNO-to-IoT Platform application level.

On behalf of the device, Secure Credentials from Telefónica will:

  • Store the device credentials.
  • Establish secure TLS/DTLS connections to the IoT Platform.

Perfect for limited devices:

  • Reduction of mobile data overload.
  • Lower energy consumption by the device.
  • Large- and medium-sized enterprises.
Contact Us

Make the right decisions

Cybercriminals do not rest, do not wait any longer and contact us to find out what are your company needs in cyber security.

CONTACT US

LEARN MORE ABOUT OTHER RELATED SERVICES

IoT Threat Detection

Innovative solutions for protecting the IoT ecosystem from threats.

GO TO IoT THREAT DETECTION

OT security

We manage cyber security for your industrial environment.

4 services

GO TO OT SECURITY