Professional Documents
Culture Documents
Aerissecurityv 721663682410091
Aerissecurityv 721663682410091
Aerissecurityv 721663682410091
Quickly and accurately protect, detect and respond to cellular IoT security threats
PRODUCT BROCHURE
Today, most Internet of Things (IoT) businesses implement best practices to keep their
enterprises and IoT programs safe. Yet they find themselves more exposed to cyberattacks
today than ever before. The steady increase in IoT attacks continues to inflict financial losses
and sometimes damages brand reputation and sets business profitability back by years.
IT teams responsible for securing IoT solutions deploy a wide array of enterprise cybersecurity tools—firewalls,
VPNs, Endpoint Protection Detection & Response (EPDR), Security Incident and Event Management (SIEM),
Endpoint Detection and Response (EDR), etc.—whose effectiveness is only rendered to discover and remediate
certain types of attacks. That’s why organizations need security capabilities to analyze network traffic in real-time to
detect malicious activities and protect against unknown threats.
Nowhere is the need more evident than in the cellular IoT space, where the problem of detecting risks from
unknown threats and attacks is beyond the capacity of a single IoT solution provider to solve.
Aeris INDR combines rules and behavioral detections using machine learning and/or
Artificial Intelligence to identify anomalies and threats. What makes Aeris INDR unique
is the rich set of network data from 15 million cellular IoT devices deployed
globally across diverse industries and use cases.
Protect
The first step to improve IoT security is through protection. This can be achieved
by protecting unauthorized actors or services from accessing the network or by
encrypting data on the network, both in transit and at rest, to ensure integrity and
protect theft or leakage. This helps to securely and reliably transfer large amounts
of data from the device to your network or to other data centers.
• Destination Endpoints
Endpoints are sources and destinations of data transmission activity within the
IoT network. While many IoT networks adhere to a hub-and-spoke architecture,
other models, like a mesh network where IoT devices can talk to each other,
are also prevalent. Monitoring the source and destination IPs contacted by
an IoT network can be a powerful tool to detect malicious activity, such as
pivoting attacks or device hijacking (for botnet attacks).
Deep Forensics
Once a potential compromise has been identified, you can “drill down”
further on each device using several different options:
Any one of these three options will enable you to perform deep
forensics of the data traffic pattern and triage the root cause(s) behind
any anomaly or potential security threat.
Protect
Features Objectives Outcome
1. Private Domain Name Server (DNS) 1. Protect unauthorized actors or services from 1. Devices are only allowed to interact with
accessing the network (while also detecting authorized servers and endpoints on the
2. ConnectionLockTM
shadow IoT). network.
3. Non-dialable numbers
2. Encrypt data on the network, both in-transit 2. Devices are properly segmented and isolated
4. SMS & AccountLock and at-rest, to ensure integrity and protect to their designated networks.
theft or leakage.
5. Cloud Connect 3. Devices can adhere to best practices like
6. Virtual Private Network (VPN) 3. Minimize risk posed by exposure to public secure by design.
DNS servers.
Detect
Features Objectives Outcome
1. Indicators of Compromise (IOCs) 1. Minimize manual efforts, time, and resources 1. Detects traffic anomalies and security threats
to identify issues. immediately.
2. Security Risk Score (SRS)
2. Highlight potential security vulnerabilities 2. Strengthens the overall security level.
and incidents at IoT scale and speed of
3. Lowers the amount of internal security
deployment.
resources and allocates resources to address
3. Expand security awareness, inform on best other business needs.
practices, and make key security indicators
more accessible.
Respond
Features Objectives Outcome
1. Deep forensics 1. Triage and validate potential anomalies and 1. Detects server anomalies and threats.
security issues.
2. Block traffic to/from compromised devices 2. Prevents data overage charges.
2. Alert on confirmed incidents or threats.
3. Responds rapidly to isolate vulnerable or
3. Block or suspend traffic to impacted devices. compromised devices.
Protect
Multi-Layer Defense
Security by Design
Security in Depth
Detect Respond
Aeris has been one of the early pioneers to help businesses around the
Europe Contact:
world successfully monetize and scale their IoT programs. We are 100%
EU_info@aeris.net or
committed to partnering with you to bring the honest perspective needed to +44 118 315 0614
help you reach the business goals. With 30 years of experience, we recognize
that one size does not fit all. Regardless of where you are on your IoT journey, India Contact:
your business will change over time. That is why we offer extra features and india_info@aeris.net or
support options to address your unique set of requirements. +91 01206156100
© 2022 Aeris Communications, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of Aeris
Communications, Inc. Specifications are subject to change without notice. Aeris, the Aeris logo, Aeris Connection Lock, and Aeris AerPort are trademarks
or registered trademarks of Aeris Communications, Inc. in the United States and/or other countries.
A0822
© 2022 AERIS COMMUNICATIONS, INC. 6