Icon Labs Announces Floodgate Key Manager

For automated credentialing

icon-labs-logo Icon Labs, a provider of security solutions for IoT and edge devices, has announced the availability of Floodgate Key Manager. This product enables OEMs and device developers to add secure credentialing services to their devices. The embedded key management solution provides integration with multiple certificate authorities, including Verizon’s certificate authority, also known as IoT SC. keymanager_bu

The Floodgate Key Manager is an embedded key management client providing automated enrollment with Certificate Authorities using the industry’s only RTOS-compatible implementation of the SCEP protocol. The Floodgate Key Manager supports embedded Linux and a wide variety of RTOSes including Nucleus, UC/OS-III, ThreadX, VxWorks, and LynxOS.

Icon Labs has added secure credentialing to the industry proven Floodgate Security Framework, the only security platform that provides a full suite of device protection, secure credentialing services, and integration with IoT cloud services. In addition to secure credentialing, the Icon Labs Floodgate Security Framework includes secure boot, secure software updates, firewall, intrusion detection, TLS, and a management agent.

Today’s security challenge is “how do I automate the process of securely enrolling each new device into the network?”

Icon Labs, Renesas, and Verizon have teamed up to provide a solution.  Icon Labs’ Floodgate Key Manager for IoT devices works with Verizon’s IoT SC solution to allow IoT devices to perform automatic enrollment.  During enrollment, each device securely obtains a certificate that is used for identification and authentication when communicating with other devices also enrolled in the same PKI system.

The development and integration is complete and available today for demonstration on the Renesas Synergy platform from Renesas Electronics America, Inc. The Synergy platform provides the hardware foundation ensuring that the secure boot code, cryptographic keys, certificates, and signatures have not been tampered with. Synergy provides hardware enforced memory protection to ensure that hackers cannot tamper with the boot sequence or the secure boot operations.

For more information, visit Icon Labs website.

Leave a Reply

Your email address will not be published. Required fields are marked *