PKI Manufacturing and Industrial OEM

Are you ready for the next industrial revolution? Industry analysts predict that the number of connected devices will double between 2017 and 2020. With that connectivity, cyber threats to manufacturers will continue to grow.

Equipment engineer analyzing manufacturing cybersecurity data


Modern original equipment manufacturers (OEMs) face an assortment of manufacturing cybersecurity concerns — from threats against connected devices and databases in production operations, to challenges protecting customer information and trade secrets. mare not only tasked with producing world-class components and parts, but also have to manage the security of sensitive information, financial information, and production-line software. It’s a heavy burden to bear.

Insufficient security during operations can lead to attacks on connected devices, injection of unauthorized code, or even the production of unauthorized or fraudulent units – exposing manufacturers to significant financial and reputational damage, and placing consumers at risk. Once deployed, effective management of in-field updates to the product line can mean the difference between securing a satisfied customer or embarking on a crisis-management campaign. Embedding security by design into device development should not be an afterthought – it should be “must have” from the start.

Keyfactor Command for IoT gives manufacturers a complete, efficient and effective cybersecurity solution for preventing the dangers posed by hacks of product-control systems and theft of sensitive customer information. A loss of trust has clear financial costs and impacts to the physical safety of workers and consumers alike. Keyfactor Command for IoT eliminates these risks, offering end-to-end security for connected devices, protecting your line and the products you manufacture.

Keyfactor Command for
IoT Case Study

What happens when robotic welders are imposters?

One company, a $3B global manufacturer of welding products, believed it was purchasing authentic robotic welding arms from resellers, along with service contracts from the manufacturer. With production issues increasing in frequency, service technicians were dispatched to the plant floor for a repair – only to discover that while the robotic arm looked like the genuine product, it was actually a fake.


Imposter products caused reduced productivity and led to high-cost repairs.

The arm had been reversed-engineered with less expensive, non-supported parts by unregulated parties. Beyond the concerns related to tampering, these imposter robotic arms were faulty, creating additional costs to the companies and the welding product manufacturer as they responded to the service calls to repair fraudulent equipment.


Verify the robotic arm is an OEM part.

Keyfactor worked with the manufacturer on this project to enable the installation of digital certificates on each robotic arm during the original equipment manufacturer’s development process. This allowed the manufacturer to authenticate each arm digitally prior to sending a technician to attempt repairs on unsupported robotic arms, reducing fraudulent claims and costs, and mitigating risk to end users and customers.


Keyfactor knows that manufacturers must constantly keep pace with regulatory stipulations and industry-related threats. Keyfactor ensures your secure identity protocols are compliant and your systems are at-the-ready to keep even the most progressive threats at bay.

Regulatory Requirements

  • Payment Card Industry Standards (PCI DSS) 
  • The International Organization for Standardization (ISO)
  • Sarbanes-Oxley Act (SOX) 
  • ITAR (International Traffic in Arms Regulations)


Risks and Vulnerabilities

  • Advanced and persistent attacks 
  • Unauthorized code or access to devices 
  • Use of fraudulent products 
  • Interruption of production 
  • Loss of customer information 
  • Stolen intellectual property


Keyfactor Command for IoT makes it easy and affordable to embed high-assurance secure identity in every step of the manufacturing and IoT device lifecycle. Through design, manufacturing, deployment, and ongoing management, Keyfactor Command for IoT provides the identity foundation you need to produce and sustain the most secure devices on the market. 


With Keyfactor Command for IoT You Get:

Secure Code Signing

Signing firmware and software updates are a critical best practice to ensure that the software installed in your devices is genuine.

Extended Identity Attributes

Bind custom attributes to device identities without having to modify, revoke or reissue any certificate.

Installation and Identity Provisioning

Installation of Keyfactor Command for IoT and provisioning of a secure and unique identity during the device activation process.


Keyfactor Command for IoT empowers one-step automation of certificate and Root of Trust (RoT) management, and is available for embedded Android, and native-C for real-time operating systems.

Complete Certificate Lifecycle

Automated lifecycle management of every certificate in your environment, including publicly trusted certificates and certificates from other issuing authorities.

Mass Scalability

Proven in environments of 500-million devices, running either on-premise, in the cloud, or in a custom architected hybrid mode.

Centralized Root of Trust Management

Certificates, key stores, and trust stores across all devices, applications, servers and services within the IoT ecosystem.

Private and Public Certificate Authority

Includes a fully managed private PKI, and supports both internal certificate authorities as well as public issuers such as Certicom, DigiCert, and Entrust.


Incorporate encryption, authentication, and secure code signing within your IoT devices and applications using Keyfactor Command SDKs and APIs.

Find out how the Keyfactor platform can modernize your PKI, prevent
certificate outages, accelerate DevOps security, and more.