Device Authority

  |  By Louise José
Paul Lockley – VP Sales, EMEA In the ever-evolving landscape of transportation, the emergence of Connected and Automated Vehicles (CAVs) presents a promising shift towards safer, greener, and more accessible mobility solutions. However, as we embark on this transformative journey, it’s imperative to address the ethical considerations inherent in the development and deployment of CAVs.
  |  By Claire Tennant
IoThinkTank is proud to announce Device Authority as the 2024 IoT HealthTech Innovation Award winner for their groundbreaking KeyScaler-as-a-Service (KSaaS) solution. This accolade recognizes exceptional advancements in IoT technologies that significantly improve patient care and data security in the HealthTech sector.
  |  By Claire Tennant
As our world becomes more connected, keeping up with the latest trends in IoT security is a must for businesses aiming to boost efficiency, enhance customer experiences, and stay ahead of the competition. Let’s dive into the key trends shaping the IoT landscape today and how we are working to make it more secure, from advancements in AI to post-quantum cryptography and cyber resilience.
  |  By Louise José
In a security landscape that no longer tolerates assumptions of trust, IAM Zero Trust offers a stringent approach to protect your network. Discover how to apply ‘never trust, always verify’ effectively in our comprehensive look at IAM Zero Trust principles.
  |  By Louise José
In the realm of IoT, DDoS attacks are not just a threat but a harsh reality. This article cuts through the complexity of DDoS IoT threats, offering a clear understanding of how IoT devices are hijacked for DDoS attacks and presenting actionable strategies to protect these devices. From recognising vulnerabilities to implementing robust defences, we provide the insights you need to secure your network against the dire consequences of DDoS attacks.
  |  By Louise José
Why is Privilege Access Management the linchpin of your cybersecurity strategy? Our guide delivers compelling insights into PAM—what it is, why it matters, and how the right privilege access management tactics fortify your defences against data breaches and compliance violations while securing sensitive data and critical systems.
  |  By Louise José
How can your business develop and maintain identity and access management policies that safeguard your digital assets while providing appropriate access levels? In this guide, we explore the key elements of IAM policies, their critical role in organisational security, and offer actionable insights for crafting policies that align with both business needs and regulatory demands.
  |  By Louise José
Device Authority, an award-winning and recognized global leader in Identity and Access Management (IAM) for Enterprise IoT ecosystems has appointed Richard Seward as Vice President of Product Management to drive forward the company’s growing portfolio of innovative products under its KeyScaler platform.
  |  By Louise José
In today’s interconnected world, the Internet of Things (IoT) plays a crucial role in various sectors, from healthcare and transportation to energy and critical infrastructure. However, with the increasing reliance on IoT devices comes the heightened risk of cybersecurity threats. To address these challenges and enhance cybersecurity measures across the European Union (EU), the NIS 2 Directive (Directive (EU) 2022/2555) was introduced.
  |  By ip_admin
As the premier hub for recognizing excellence in the Internet of Things (IoT), IoThinkTank’s awards highlight the creativity, innovation, and dedication of leaders within the IoT ecosystem.
  |  By Device Authority
Secure Code Signing and Update Delivery for the Internet of Things (IoT) with Venafi CodeSign Protect and Device Authority KeyScaler platform
  |  By Device Authority
Using Device Authority's KeyScaler platform to manage PKI certificate provisioning to Microsoft Azure Sphere devices.
  |  By Device Authority
Automated Certificate Provisioning and Management with Device Authority's KeyScaler and Azure IoT Central

Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT). Our KeyScaler™ platform provides trust for IoT devices to help enterprises protect their investment and their customers from cyber attacks. As the professional IoT world rapidly expanded, our founders saw a need for a centralised security solution to help enterprises keep their devices safe from malicious attacks.

The state-of-the-art KeyScaler™ platform has been continuously developed over the years to provide advanced technology for customers. Device Authority helps well-renowned customers around the world protect their brand integrity, and develop new IoT devices with built-in security measures from the start.

A single platform to manage your device permissions, secure your data’s privacy, automate security protocols, and maintain compliance:

  • KeyScaler Identities: Increase efficiency and reduce IT overheads with automated password/ certificate management.
  • KeyScaler Data Security: Patented technology automates compliance and prevents disruption, espionage, and attacks.
  • KeyScaler Secure Updates: Your best defence against security breaches through unauthorised software or firmware updates.
  • KeyScaler HSM Access Controller: Mitigate security risks, accelerate time to market, and protect brand reputation with HSM Access Controller
  • KeyScaler Edge: Manage authorisation at scale with device identity, integration, and automation.

Your company’s ultimate cybersecurity protection.