Security

ZARIOT is the world’s only SIM with signalling to cloud security

IoT security challenges span from protecting devices from being turned into malicious botnets to protecting SIM cards in a mission-critical device.

Signalling Security
Signalling Firewall

Protects data over mobile network infrastructure SS7, Diameter, SMS, SIP and GTP

Virtual Private Network
Virtual Private Network

Complex encryption and hashing algorithms guarantee security over internet

APN Lock
APN Lock

Individual username and password ensure authenticity of each device

SIGNALLING FIREWALL

CELLULAR NETWORK INFRASTRUCTURE IS NOT SAFE WITHOUT SIGNALLING Security

Signalling Security Prevents:

  • Location Tracking
  • Denial of Service
  • SMS interception
  • Data interception
  • Fraud
  • Network information disclosure

VIRTUAL PRIVATE NETWORK

INTERNET IS NOT SAFE WITHOUT A VIRTUAL PRIVATE NETWORK

IP Layer Security Prevents:

  • Attacks on the data generated and consumed by IOT devices
  • Eavesdropping Listening to data (stealing content)
  • Using devices as the source of active attacks on Internet resources
  • Modifying data (falsifying content)

IOT SECURITY

must include security over

SIGNALLING & INTERNET

IOT SECURITY must include security over SIGNALLING & INTERNET
SIGNALLING FIREWALL

SIGNALLING SECURITY

  • Experts in signalling security
  • Best of breed technology
  • Award-winning mobile network security solutions

Outside of WiFi connectivity, IoT data transmission is at the mercy of the same vulnerabilities as other mobile network traffic.

Inherent security flaws in the signalling systems used (SS7 and Diameter) are frequently exploited, exposing IoT devices to a variety of attacks if the network is not properly secured.

  • Dynamic Signalling Protection for SS7, Diameter, and GTP
  • 2G, 3G, 4G, LTE-M (CAT M1) and NB-IoT networks can be secured
  • Monitored and updated constantly in response to industry recommendations and emerging threats

The ubiquity of IoT devices exposes the IP network to an ever-increasing threat of attack.

Confidentiality, integrity, and authentication must be guaranteed on the IP layer.

  • Complex encryption and hashing algorithms used by IPSEC VPN tunnels guarantee security
  • Optional redundant connection to your data centre or any other specified destination by using multiple IPSEC VPN tunnels
  • End-to-end security from malicious internet-based content – Packets never touch unmanaged internet-bearer
  • Easy configuration and maintenance for many devices at once – Traffic can be initiated from device or data center
  • VPN-only, internet-only access or both simultaneously customised per device
VPN

VPN

APN Lock

APN Lock

APN Lock ensures each device must authenticate by using an individual username and
password before transmitting data to prevent SIM hijacking.