Resources

Learn more about ZARIOT, IoT security, signalling security, and more

Datasheet

Overview of our security, coverage, and our philosophy

Introduction

A brief introduction to what ZARIOT can do for your project

Zero Trust

How can a Zero Trust philosophy be successfully applied to IoT?

Basics of Signalling Security

The basics of signalling, attacks over cellular, and how cellular can be secured

ZARIOT Introduction

A quick overview of what ZARIOT is, our security, coverage, what we can do for your IoT project, and what we mean when we say your devices will be Connected. Protected.

Sep 21, 2020

Why you need signalling security

Why do you need signalling security?

Even with IP Security, VPN & Encryption, devices are vulnerable to DoS, location tracking, and SMS and data interception over all cellular technology.

Aug 27, 2020

IoT Security

What are the primary concerns when it comes to securing an IoT deployment? This short collection of videos from our Security Series exposes some of the security risks for IoT deployments, and recommends how to tackle them through infrastructure, endpoint security and encryption techniques.

June 15, 2021

Cellular Connectivity

This compilation of videos from our Connectivity Series outlines all you need to know about cellular as a connectivity option for IoT, and how to secure it.

May 20, 2021

MWC 2021 HOTShot Interview

At MWC Barcelona 2021, ZARIOT CEO Dawood Ghalaieny spoke to Isabelle Paradis from Hot Telecom and shared his views of a future centred around the next generation of young, dynamic and bright people that can innovate to advance the industry. ZARIOT’s role in this future continues to focus on securing the IoT space and ensuring enterprises get exactly the IoT solutions they require.

June 30, 2021

How Bad is IoT Security Really?

What is the real story behind IoT security and how can enterprises tackle this growing challenge? To find out, watch this Hot Telecom HOTShot interview with Jimmy Jones, ZARIOT Head of Security. Jimmy emphasizes the need to design and include security from the start of an IoT deployment, and to understand the end-to-end solution. He highlights the importance of considering the whole IoT ecosystem and of securing connectivity.

June 24, 2021

Business-Critical Devices and the Constraints of Regulation

In this presentation, we discuss the vulnerabilities of various network types, potential attack types and documented examples, current regulations (and lack thereof) and why regulators are so powerless to act. We examine what kind of devices may need guaranteed connectivity, what uptime means to business-critical devices, and examples of individual business-critical devices fleets. Finally we address what should be done at a regulatory level as well as at an enterprise level to secure critical IoT and M2M devices.

April 9, 2021

Optimising Cellular for IoT Connectivity

At this year’s IoT Tech Expo Virtual, Stuart Mitchell outlined the latest trends in cellular IoT and mobile security, advising what MNOs can do to improve security for IoT, and what security standards and practices should be considered before roll-out.

March 17 – 18, 2021

Applying Zero Trust to Cellular IoT

What is Zero Trust and how can it be applied to IoT? How can we use Zero Trust to identify the vulnerabilities in cellular IoT deployments? What techniques and strategies are needed to implement best in class cybersecurity principles? Stuart Mitchell clarifies all.

March 17 – 18, 2021

IoT Security in a Zero-Trust Environment

In episode 06 of IoT For All’s Let’s Connect! Podcast, Stuart Mitchell talks about IoT security, vulnerabilities in equipment and in mobile network infrastructure, and how the future of IoT deployment needs to look to Zero Trust environments.

March 12 2021

5G is no Exception – Cellular is Still Insecure

Cellular connectivity from 2G to 4G has been unsecured, and 5G is no magic bullet. Stuart Mitchell discusses the history of mobile networks, attack types, the challenges of 5G security, current protections, and how these fit into best practices for end-to-end IoT security.

Dec 11, 2020

Using Zero Trust to Protect Cellular IoT Devices

Speaking at IoT Slam, Stuart Mitchell invites us to use the 6 Ws to ask: What techniques can be used to protect SIMs? What vulnerabilities are inherent on the mobile network infrastructure itself? How and when should the public Internet be used carry critical and sensitive data for analysis and storage? And more…

Aug 19, 2020