SentriX

SentriX Security Deployment as-a-Service

IoT Security Deployment as-a-Service

Simplifying IoT Security

Define, provision, and deploy robust IoT device programming system, easy-to-use tools, and a flexible as-a-service model.

IoT device OEMs benefit from robust device security

Brand Protection

IP Protection

Regulation

Supply Chain Integrity

OEMs require robust hardware and software security for IoT devices to protect their brand and meet regulation, data privacy, and safety requirements. The best design approach is to build hardware-based security into their products.

SentriX Benefits

An ideal security deployment process eliminates roadblocks to building secure products for your OEM customers.

Commercial Benefits

  • Low upfront cost
  • No minimum order quantities Per part as-a-Service model
  • Offer a premium value-added and revenue-generating service
  • Upgrade an existing PSV5000 or PSV7000 to SentriX

Ease of Use

  • Integrated software tools for design to production
  • Intuitive collaboration tools
  • Low or high-volume production
  • Preconfigured security use cases
  • Optional services, eg. Automated cloud onboarding

Robust Security

  • Pre-manufacturing assembly security deployment
  • Authenticates parts
  • Cryptographic protection of secrets and firmware
  • Supports silicon hardware Roots of Trust
  • Production equipment with integrated FIPS 140-2 Level 3 compliant hardware security module (HSM)

Why Security Deployment as-a-service & How it Works

Watch to learn the benefits of SentriX and how SentriX simplifies security deployments. 

SentriX Removes Roadblocks to Deploying Security

The complexity of IoT hardware-based security creates roadblocks OEMs, Electronic Manufacturing Services (EMS), Contract Manufacturers (CM), Programming Centers, and Silicon vendors face deploying solutions:

SentriX Product Creator

Security Roadblocks Solution
Complexity: Dozens of security inputs and thousands of security input combinations per part plus numerous technical and commercial requirements. Reduces security inputs with support for most common security use cases.
Collaboration: Lack of tools for collaboration between developers, production and tech vendors. Enables seamless collaboration on security definition between OEM, programming location and silicon vendor.
Resources: Lack of specialized security and software team resources. Minimizes specialized resources required to define security define security use cases with support for pre-defined use cases and collaboration with programming center and silicon vendor.

SentriX Production System

Security Roadblocks Solution
Cost: Large cost for custom development of security deployment software and processes Reduces cost with a per part as-a-Service Model
Production: Manual handoff from development to production is error-prone and lacks traceability. Streamlines handoff from design to production with an integrated tool suite.
Risk: Unsecure supply chain increases attack surfaces. Minimizes attack surface by securing devices at the earliest point of production.

How SentriX Simplifies IoT Security

SentriX Product CreatorTM Collaboration Tool

Imports keys and certificates needed for selected use cases

Enables security profile definition for production

Wraps OEM secrets to production equipment HSM

Collaborate with OEM & silicon vendor on pre-configured use cases or custom security flow with Product Creator software application.

  • SentriX GO*TM
  • Easy-to-use
  • Supports most common use cases
  • Moderate flexibility
  • Suitable for high or low volume

*Use cases based on device functionality but include device ID, cloud onboarding, secure boot, authenticity verification, access control, and static data.

A custom security flow supports complex security requirements enabling you to take full advantage of security features in a security IC or microcontroller.

  • Custom
  • Powerful collaboration tool
  • Supports complex provisioning
  • High flexibility
  • Suitable for high volume

Schedule a Demo today!

Security Deployment Models

Data I/O offers two as-a-service security deployment models:

  • Upgrade a PSV7000 or PSV5000 to SentriX
  • Pre-integrated SentriX solution

Partners

SentriX Deployments

Silicon Partners

Technology Partners

Security ICs

  • Infineon Optiga TPM
  • Infineon Optiga Trust E
  • Infineon Optiga Trust M
  • Infineon Optiga Trust X
  • Maxim Integrated Deep Cover® DS28C36
  • Maxim Integrated Deep Cover® DS2476
  • NXP A70CM
  • NXP A71CH
  • NXP SE050
  • More coming soon!

Microcontrollers

  • Cypress PSoC 6
  • Microchip SAML11
  • NXP LPC5500
  • NXP FS32K
  • Renesas RX651
  • More coming soon!

Microprocessors

  • Coming soon!

Data I/O Corporation
6645 185th Avenue NE, Suite 100
Redmond, WA 98052 USA

Telephone: +1 425-881-6444
Toll Free in USA: 800-426-1045
FAX: +1 425-867-6972