Secure Credentials
It simplifies the management of credentials on IoT devices.
- SIM-based authentication
- Life-cycle management
- Cost reduction
- Direct integration with AWS and Azure
What can we do for your cyber security?
It manages credentials for IoT devices by using mobile identity (SIM card) and the Telefónica network
Secure Credentials is a service designed to meet the security needs of clients by guaranteeing trust between devices and the IoT platform.
Secure Credentials complements the offer from our managed connectivity platform (KITE) that provides SIM-based mobile-specific connectivity for IoT (integrated into the IoT device itself) and adds numerous functionalities and services, guaranteeing communication security when using our own network to connect with the client’s data centre, private or public cloud environment.
Secure Credentials provides a secure identity to IoT devices, which plays a crucial role in the authentication process for the IoT platform.
Telefónica SIM card and network
Telefónica SIM card and network as a trust anchor for verifying the identity and integrity of IoT devices.
Life-cycle management
It simplifies the real-time management of credentials from issuance to automatic device onboarding, renewal and revocation, ensuring that connected devices are exactly what they claim to be.
Cost reduction
It reduces costs by mitigating the risks of tasks prone to error and preventing the personalisation of firmware.
Integration with PaaS
Option to automatically integrate with the IoT Core from Amazon Web Services (AWS) and the IoT Hub from Microsoft Azure. It provides a mutual identification and guarantees the integrity and traceability of transactions.
Technical characteristics
SIM- and network-based authentication.
Communication encryption at MNO-to-IoT Platform application level.
On behalf of the device, Secure Credentials from Telefónica will:
- Store the device credentials.
- Establish secure TLS/DTLS connections to the IoT Platform.
Perfect for limited devices:
- Reduction of mobile data overload.
- Lower energy consumption by the device.
Who is this service aimed at?
- Large- and medium-sized enterprises.

Make the right decisions
Cybercriminals do not rest, do not wait any longer and contact us to find out what are your company needs in cyber security.
CONTACT USLEARN MORE ABOUT OTHER RELATED SERVICES
IoT Threat Detection
Innovative solutions for protecting the IoT ecosystem from threats.
GO TO IoT THREAT DETECTION