Trusted Connectivity

Learn More

Security, Privacy, Reliability, Dependability, Safety

Trusted Connectivity

The common sentiment, “who cares about my personal data, why someone should spy on me, hack my smartphone, there is nothing to hide , I am just an individual”, still is largely widespread and demonstrates a deep lack of knowledge of trust-related topics. Trusted connectivity ensures that the collection and exchange of data are reliable, safe, secure, and based on trusted relationships among all communication devices and individuals accessing these data. Identity controls and authorization systems have to be established to build trust between these entities to share data reliably.

CISC Solution Offering

CISC provides solutions for identification, authentication, and authorization, secure end-2-end communication based on existing security protocols and processes, that can be integrated into a trust management system.

At platform level, CISC offers hardware-based provisioning services for IoT devices, device-reliable authentication mechanisms, certificate-based authentication, encryption and secure password recovery, secure fleet management.

Markets
Case Study
Product
IoT Terminal Access Control
IoT Terminal Access Control
IoT Terminal Access Control

Improvements on remote management, control and maintenance of access system

Markets
Case Study
Product
Bosch Generic Timer Module
Bosch Generic Timer Module
Bosch Generic Timer Module

Possibility of additional communication interfaces to existing microcontroller systems on-demand

Markets
Case Study
Product
Edge Gateway
Edge Gateway
Edge Gateway

Wirless Sensors for improved monitoring and maintenance of large facilities

Markets
Case Study
Product
IoT Data Collection and Analytics
IoT Data Collection and Analytics
IoT Data Collection and Analytics

Optimize your processes of collecting data from IoT devices

Contact

Get in touch

with CISC

CONTACT US