The security of IoT is constantly at risk from information leaks, device vulnerabilities, and external attacks. It provides security management for that.
Device Defender consists of two components: security auditing of devices and vulnerability detection. Audits are conducted automatically on a regular basis, and measures can be implemented automatically based on the results. Anomaly detection can be configured using either machine learning (ML) or rule-based settings. All features are designed to require no human intervention. The cost is included in the AWS IoT development kit (Pi version).
Inquire About This Product
basic information
Features (1) Applicable to environments in IoT operations No additional hardware is required, and Device Defender is provided as a cloud-side feature. It can be applied to devices already in operation. This will be offered as a feature addition to our AWS IoT development kit (Pi version). (2) Almost automatic auditing and detection You can freely set the schedule for auditing and detection, and only need to check the alarm results. Mitigation actions can also be automated, making operations hassle-free. (3) Affordable pricing The monthly cost for AWS IoT is approximately 1,000 yen/month for auditing and inspecting about 100 devices. (4) Reliable support We provide a reliable manual and 14 days of free support. Even those new to Device Defender can feel secure. Provided functions (1) Auditing - Selection of audit check items (sharing of device certificates, quality, expiration, residuals; quality and expiration of CA certificates; excessive policy permissions; client ID conflicts) (2) Detection - Detection items on the cloud side (intellectual property theft, MQTT data leakage, impersonation) - Detection items on the device side (DOS, device intrusion, escalation, data leakage, monitoring, malware, C&C, ransomware)
Price information
45,100 yen
Price range
P2
Delivery Time
P3
Applications/Examples of results
Recommended for: - Those who are using AWS IoT for the first time or are considering using it in the future - Those who are considering development using Node-RED - Those who are thinking about utilizing sensor information - Those who are considering the realization of a smart society, such as smart cities and smart homes - Those who are thinking about security management for IoT devices
Detailed information
-
Overall picture
-
Overview
-
Audit example
-
Detection example
Company information
Our company provides a comfortable wireless LAN (WiFi) and M2M environment through wireless visualization. Additionally, we conduct on-site surveys and troubleshoot issues through radio wave surveys, security investigations, and traffic surveys. Please feel free to contact us if you have any requests.