THINGS

The Internet of Things is part of our daily lives and is, unfortunately, a common entry point for bad actors accessing sensitive data. Cloudentity’s MicroPerimeter™ Security integrates directly with IoT architecture while leveraging the power and flexibility of our CIAM.next platform to ensure zero-trust authorization capabilities

LIGHTWEIGHT 
ENFORCEMENT
TOOLS

Adding security to devices can be difficult when policy enforcement tools are full stack applications on their own. Cloudentity’s MicroPerimeter™ Sidecar for IoT is an extremely small, lightweight tool that runs onboard your IoT device, providing direct security enforcement without custom code or handcrafted solutions.

TRANSACTIONAL 
LOGGING

Compliance mandates, such as GDPR, require an audit trail of identity data used between IoT connections and service calls. Traditional architectures make it difficult to have visibility into information services have access to, or why a service accessed another service. Cloudentity’s centralized logging uses transactional tags to track requests for private data from users, to services, and IoT devices in a clear, easy-to-understand report for audit and compliance.

INTEGRATED
PERMISSION
AND CONSENT

Every IoT device is given a unique ID that is tied to policy rules related to identity information the device can access and share. For example, a medical device will be registered with central policy management along with a set of controls that restrict how much, who, or what can access an individual’s records.

FINE-GRAINED
SECURITY
POLICIES 

Cloudentity’s security policies are CIAM.next aware, meaning access to a device may require multifactor authentication, or specific user attributes in order to grant permissions.  Granular security policies executed at the device level can reduce the risk of exposure, maintain consumer confidence, and meet compliance regulations.