enterprisesecuritymag

Comodo CA: 360-degree Security Solutions for IoT Devices

CIO VendorDamon Kachur, VP of IoT Solutions
Imagine a cold, rainy Sunday morning; you stumble down to the kitchen to find out that your internet-enabled coffee maker is not working. A message flashes on your smartphone: “Your coffee pot has been hacked, and unless you pay $10, you can’t sip the coffee.” Maybe such a situation is only fanciful, at least for now! As the number of connected devices reaches unprecedented counts (Gartner estimates it to be 20.8 billion by 2020), security concerns regarding these devices will become an important area for companies to focus on in the days ahead. Organizations without a robust public key infrastructure (PKI) in place may expose their connect devices to vulnerabilities for cyber criminals to exploit. The respective infrastructure providers may fail to pre-empt the connected devices from the cybercrime. Albeit PKIs have been in commercial use for over two decades, manufacturers often face intricacies in connecting and authenticating a device with the network. Comodo CA is a firm that specializes in IoT PKI management for comprehensively securing connected devices and networking systems.
Comodo CA has integrated Device Authority into its IoT PKI manager platform which enables its clients to create initial certificates and administer reporting and execution from a single point of contact. The key differentiator of the Comodo CA IoT PKI manager platform is that it enables organizations to identify and tackle threats from a unified portal and allows them to focus on their core business objectives without wasting much time in threat-related issues.

Since its inception, the firm has issued over 100 million TLS/SSL certificates worldwide and has played an exemplary role in securing websites and earning the trust of its businesses and consumers. “We provide market-proven, mutual authentication solutions that enable administrators to enroll, download, and decrypt certificate batches efficiently and promptly,” says Damon Kachur, VP of IoT Solutions, Comodo CA.
Kachur underlines that device manufacturers, particularly from the healthcare industry, often face intricacies in managing interoperability within hospitals. Comodo CA is currently working to partner with medical device manufacturers to ensure connected devices designed for medical firms are authenticated before a physician uses the device to perform any critical function.

We provide market-proven, mutual authentication solutions that enable administrators to enroll, download, and decrypt certificate batches efficiently and promptly


Comodo CA also brings forth a ‘Business Partnership Program’ to bolster the security posture of enterprises. As a part of the program, partnered entities such as web hosting providers, domain registrars, and security specialists receive training, certifications, and awards that pave the way to mutual success for both the organization and end users. “We are leveraging our customers, partners, and industry relationships to craft best-in-market security solutions for our clients. Through these partnerships, we are looking to assist the industry as a group and not just as an individual entity,” mentions Kachur.

He points out that the time-to-market often remains one of the key business aspects for device manufacturers. But after the R&D phase, it usually takes six to eight, or even 12 weeks, for device manufacturers to deploy a PKI system with HSM and make the product market ready. Comodo CA offers a strong proposition in such cases by cutting down PKI implementation time to just three weeks and aiding manufacturers in getting security provisions on time. Adding to this, the firm also educates consumers about the correct use of IoT devices to prevent them from getting exposed to hackers.
Forging ahead, the firm intends to continue working toward safeguarding the connected device ecosystem. “Security is our core business, and it brings tremendous value to us. We are deeply committed to providing 360-degree security and threat intelligence solutions and play a pivotal role in protecting the connected devices.”