IoT Security

ClearBlade IoT Security

Security Is Critical, so our Standards Are Second to None

ClearBlade was built with security in mind. Learn how protecting your solution is our mission.

Learn more

Trusted by Fortune 500 companies in energy, transportation, and infrastructure:

Judicious Privileges

ClearBlade has delivered enterprise-grade IoT infrastructure since 2014. Proven in high-stakes industries.

API Layer Extraction

Leverage API layers to protect and guard systems of record and their system credentials.

Specific Auth Model

Create and implement the auth model that matches the solution's needs.

Product Development Principles
The Core to Protecting
Your IoT

Compliant + Flexible Architecture

Platform performs optimally on any infrastructure.
There is no dependency on cloud-specific APIs or definitions. The ClearBlade Platform will run on any Linux OS, leveraging containers to fit within the boundaries of your secure network. Whether virtualized or bare metal, ClearBlade can install and run securely next to your core systems and behind your firewall.

Local Edges: Even when using a cloud-based platform, building IoT systems with secure access behind your firewall is still possible. The ClearBlade edge devices can provide critical enterprise integration, run within the enterprise security requirement, and manage entire remote IoT applications. The edges provide ways to leverage cloud value while protecting your enterprise security.

Security Authentication

Model for authenticated and anonymous interactions. Every system interaction requires a device and user to gain a valid token.
This token model enables:

  • Comprehensive auditing of every session.
  • Simple customization to allow for system-specific duration.
  • Extensibility for third-party user registries to grant permission.
  • Override capability to build 2FA. Flexibility to leverage user credentials/device keys/trusted certificates.
Deploy within 30 days.
Get started

IoT Security Awareness

Recognizing the potential for emerging threats, ClearBlade has made IoT system awareness the core of its offering. Security is always evolving, and while building the best solution upfront is desired, there are often attempts at intrusion and abuse of your IoT system. With ClearBlade, you can:

Audit every transaction

Including API calls, messages, user actions, and data CRUD ever performed.

Real-time system usage

Identify abnormal behavior, like if a single credential is accessing large amounts of data.

Validate App Resilience

Rapidly see if enterprise applications behave with unidentified network traffic.

Monitor device activity

Ensure you receive expected heartbeats and payloads from your connected devices.
Get Started

IoT Security Encryption

By encrypting your data, you can ensure that the secured data cannot be read by prying eyes, no matter what server it resides on or network infrastructure it travels over. ClearBlade leverages the community best practices to ensure that data is encrypted during:

Transit

  • Engrained for all users communicating to the Platform
  • Integrated for enterprise applications sharing information. Additional 3rd party encryption may be leveraged
  • Embedded into devices, adding an additional protection layer, even when their source protocol offers limited security
  • Inherit in every transaction between the ClearBlade Edge and IoT Platform

Internal Transit

  • Communicate securely between ClearBlade instances
  • Communicate securely between cloud providers
  • Extensible to 3rd party trust authorities
    All messages, systems, API calls, and data transfers are fully logged and auditable
  • Maintain encryption keys to protect secure IoT data from cloud vendors, hosting providers, and other internal teams

At Rest

  • Encrypt cached and stored data within the ClearBlade Platform
  • Protect low-level file systems
  • Secure your data across all elements of your IoT ecosystem