Security, Privacy, Reliability, Dependability, Safety
The common sentiment, “who cares about my personal data, why someone should spy on me, hack my smartphone, there is nothing to hide , I am just an individual”, still is largely widespread and demonstrates a deep lack of knowledge of trust-related topics. Trusted connectivity ensures that the collection and exchange of data are reliable, safe, secure, and based on trusted relationships among all communication devices and individuals accessing these data. Identity controls and authorization systems have to be established to build trust between these entities to share data reliably.
CISC Solution Offering
CISC provides solutions for identification, authentication, and authorization, secure end-2-end communication based on existing security protocols and processes, that can be integrated into a trust management system.
At platform level, CISC offers hardware-based provisioning services for IoT devices, device-reliable authentication mechanisms, certificate-based authentication, encryption and secure password recovery, secure fleet management.