Roots of Trust for the Internet of Things (IoT)

Please submit the form to access a complimentary copy of the white paper.
What are the Roots of Trust?
Adapting Roots of Trust to the IoT
Applications of Roots of Trust in the IoT
Overall IoT Security Architecture

IoT devices will be used by both individual consumers, as well as by organizations, and IoT computing will be embedded into almost every imaginable type of device: automobiles, home security and home automation, manufacturing stations, oil and gas controls, power line transformers, jet engines, medical implants, x-ray machines, and more. It should be self-evident that IoT devices must be able to verify the code they run, establish their trustworthiness to other devices, and securely connect to other devices on or off the Internet.

This white paper covers:

Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Symantec Corporation, 350 Ellis Street, Mountain View, CA 94043 United States of America
Access the white paper now.