IoT Inspector becomes ONEKEY – The Central Platform for Automated IIoT/OT Security and Compliance
IoT Inspector becomes ONEKEY – The Central Platform for Automated IIoT/OT Security and Compliance
New name underlines expanded focus for industry (IIoT), manufacturing (OT) and Internet of Things (IoT)
Düsseldorf/Germany, May 3, 2022 – German IT security company IoT Inspector is giving itself a new name. The specialist team for automated analysis of IoT devices is now called ONEKEY and continues to operate the leading European platform for industrial controls (IIoT), production equipment (OT) and other smart devices (IoT).
With the new name, the company underlines the stronger focus on security in the industrial area of the Internet of Things, which has already taken place since the beginning of 2022: „In recent months, the need in specifically this area – security in the firmware of industrial plants, virtually any device connected to a network – has grown enormously. At the same time, several scandals have made clear that manufacturers and users need a simple system to verify the security and compliance of industrial devices. We strive to be the ONEKEY solution when it comes to secure design, procurement and persistent monitoring of IoT devices,“ says Jan Wendenburg, CEO of ONEKEY. Just a few weeks ago, the company discovered massive security vulnerabilities in chipsets from Realtek, in Broadcom-supported devices, and in other devices that can be found not only in private environments, but especially in corporate networks.
Hackers use expert knowledge! With so-called technical advisories, i.e. technical details about vulnerabilities, ONEKEY has helped companies and institutions in the past months to uncover partly serious security holes. In many cases, ONEKEY has also worked together with the manufacturers to quickly eliminate the problems. However, hackers are now also taking advantage of expert knowledge: „After the publication of technical information about security vulnerabilities, hackers often immediately begin to attack these very vulnerabilities. That is why we are also calling for a general, mandatory basic security check of software for industrial control and production systems in the manufacturing and procurement process,“ demands Jan Wendenburg, CEO of ONEKEY. This is because it is not uncommon for outdated or defective libraries from other manufacturers to be integrated, which weaken the overall system – such vulnerabilities, which were never discovered, thus migrate from one generation of equipment to the next. For the Düsseldorf-based company, the new name is therefore not just a new brand – but the basis for a 360-degree view of all connected devices, whether in the industrial, infrastructure or smart home sectors.
Supply chain trust is great – control is better! Many organizations and IT departments usually rely on manufacturers‘ statements about components of the delivered software, but manufacturers often do not know exactly which components are in their own software. Many subcontractors and outsourced development departments of the manufacturers usually pay more attention to costs than to the exact testing of all individual components of a software. ONEKEY can automatically identify the software components and delivers an independent list for this purpose – the „Software Bill of Materials“ (SBOM). Thus, manufacturers and purchasers receive significantly more transparency and security.
IT security is a process – not a status! An industrial control system or critical infrastructure device may be secure today – but tomorrow it may have completely new vulnerabilities in the components it contains. Every day, hundreds of new vulnerabilities are found and published worldwide. „ONEKEY automatically creates so-called „digital twins“ of these controls and devices and can then monitor them 24/7 fully automatically. In this way, valuable industrial equipment can be monitored without interfering with the production process, and alerted to new vulnerabilities virtually in real time,“ Wendenburg said. „The political unrest in the world is a risk for data outflows, attacks on critical infrastructures, which is growing with an unknown factor: Timely, fast verification is necessary, we have the key to it,“ ONEKEY CEO Jan Wendenburg sums up.
About ONEKEY ONEKEY (formerly IoT Inspector) is the leading European platform for automated security & compliance analysis for industrial (IIoT), manufacturing (OT) and Internet of Things (IoT) devices. Using automatically generated „Digital Twins“ and „Software Bill of Materials (SBOM)“ of devices, ONEKEY autonomously analyzes firmware for critical security vulnerabilities and compliance violations, all without source code, device or network access. Vulnerabilities for attacks and security risks are identified in the shortest possible time and can thus be specifically remedied. Easily integrated into software development and procurement processes, the solution enables manufacturers, distributors and users of IoT technology to quickly and automatically check security and compliance before use and 24/7 throughout the product lifecycle. Leading companies such as SWISSCOM, VERBUND AG and ZYXEL are using this platform today – universities and research institutions can use the ONEKEY platform for study purposes free of charge.
Further Information:ONEKEY GmbH, Kaiserswerther Straße 45, 40477 Düsseldorf, Germany, www.onekey.com
Um dir ein optimales Erlebnis zu bieten, verwenden wir Technologien wie Cookies, um Geräteinformationen zu speichern und/oder darauf zuzugreifen. Wenn du diesen Technologien zustimmst, können wir Daten wie das Surfverhalten oder eindeutige IDs auf dieser Website verarbeiten. Wenn du deine Zustimmung nicht erteilst oder zurückziehst, können bestimmte Merkmale und Funktionen beeinträchtigt werden.
Funktional
Immer aktiv
Die technische Speicherung oder der Zugang ist unbedingt erforderlich für den rechtmäßigen Zweck, die Nutzung eines bestimmten Dienstes zu ermöglichen, der vom Teilnehmer oder Nutzer ausdrücklich gewünscht wird, oder für den alleinigen Zweck, die Übertragung einer Nachricht über ein elektronisches Kommunikationsnetz durchzuführen.
Vorlieben
Die technische Speicherung oder der Zugriff ist für den rechtmäßigen Zweck der Speicherung von Präferenzen erforderlich, die nicht vom Abonnenten oder Benutzer angefordert wurden.
Statistiken
Die technische Speicherung oder der Zugriff, der ausschließlich zu statistischen Zwecken erfolgt.Die technische Speicherung oder der Zugriff, der ausschließlich zu anonymen statistischen Zwecken verwendet wird. Ohne eine Vorladung, die freiwillige Zustimmung deines Internetdienstanbieters oder zusätzliche Aufzeichnungen von Dritten können die zu diesem Zweck gespeicherten oder abgerufenen Informationen allein in der Regel nicht dazu verwendet werden, dich zu identifizieren.
Marketing
Die technische Speicherung oder der Zugriff ist erforderlich, um Nutzerprofile zu erstellen, um Werbung zu versenden oder um den Nutzer auf einer Website oder über mehrere Websites hinweg zu ähnlichen Marketingzwecken zu verfolgen.
Comments are closed