July 15, 2022

Make Best Practice Second Nature

Best practices are sometimes forgotten because they have become part of our instinct. As we go about our everyday lives, we implement our own best practices. We put on our seatbelts, check the coffee’s temperature before we drink it, and look both ways before crossing the street. Not surprisingly, most of our best practices concern our security.


Microsoft’s recent blog “Best practices for large-scale IoT device deployments” addresses all of the best practices someone new to IoT should be reminded about. Do it right the first time, as they say.


What about security, our most basic best practice?

I’ll repeat here that securing your IoT devices is not that difficult, especially if you are in a lab with just a few test devices. It’s like doing those five or so best practices you do unconsciously in your car. But, what happens when you’re simultaneously driving hundreds or thousands of cars?


Scale and Automation

Security life cycle management takes on a new meaning at scale. How are you ensuring a zero-trust environment from device manufacture, to deployment, to updates, to decommissioning and recommissioning? Not to mention ensuring your security profile is maintained and actively managed when connecting to 3rd parties like Microsoft DPS and IoT Hub.


Device Authority

We are the authority in automating IoT device identity life cycle management. With the Keyscaler platform and our patented Dynamic Device Key Generation (DDKG) agents, we ensure a zero-trust environment from device manufacture to deployment, to updates, to decommissioning, recommissioning, and across 3rd party integrations.


Let us show you how automating your entire IoT Zero-Trust Security life cycle management can become a second nature best practice for you and your team.

John Hynds