Keyfactor Control for OEM
Are you ready for the next industrial revolution? Industry analysts predict that the number of connected devices will double between 2017 and 2020. With that connectivity, cyber threats to manufacturers will continue to grow.
Securing the Manufacturing Environment

Modern original equipment manufacturers (OEMs) face an assortment of cybersecurity concerns — from threats against connected devices and databases in production operationsto challenges protecting customer information and trade secrets. mare not only tasked with producing world-class components and parts, but also have to manage the security of sensitive information, financial information, and production-line software. It’s a heavy burden to bear.

Insufficient security during operations can lead to attacks on connected devices, injection of unauthorized code, or even the production of unauthorized or fraudulent units – exposing manufacturers to significant financial and reputational damage, and placing consumers at risk. Once deployed, effective management of in-field updates to the product line can mean the difference between securing a satisfied customer or embarking on a crisis-management campaign. Embedding security by design into device development should not be an afterthought – it should be “must have” from the start.

Keyfactor Control gives manufacturers a complete, efficient and effective solution for preventing the dangers posed by hacks of product-control systems and theft of sensitive customer information. A loss of trust has clear financial costs and impacts to the physical safety of workers and consumers alike. Keyfactor Control eliminates these risks, offering end-to-end security for connected devices, protecting your line and the products you manufacture.


Keyfactor Control Case Study

What happens when robotic welders are imposters?

One company, a $3B global manufacturer of welding products, believed it was purchasing authentic robotic welding arms from resellers, along with service contracts from the manufacturer. With production issues increasing in frequency, service technicians were dispatched to the plant floor for a repair – only to discover that while the robotic arm looked like the genuine product, it was actually a fake.

The Problem
Imposter products caused reduced productivity and led to high-cost repairs.

The arm had been reversed-engineered with less expensive, non-supported parts by unregulated parties. Beyond the concerns related to tampering, these imposter robotic arms were faulty, creating additional costs to the companies and the welding product manufacturer as they responded to the service calls to repair fraudulent equipment.

 

The Solution
Verify the robotic arm is an OEM part.

Keyfactor worked with the manufacturer on this project to enable the installation of digital certificates on each robotic arm during the original equipment manufacturer’s development process. This allowed the manufacturer to authenticate each arm digitally prior to sending a technician to attempt repairs on unsupported robotic arms, reducing fraudulent claims and costs, and mitigating risk to end users and customers.


Finding The Balance: Risk Management, Regulations and Production

Keyfactor knows that manufacturers must constantly keep pace with regulatory stipulations and industry-related threats. Keyfactor ensures your secure identity protocols are compliant and your systems are at-the-ready to keep even the most progressive threats at bay.
Regulatory Requirements
  • Payment Card Industry Standards (PCI DSS) 
  • The International Organization for Standardization (ISO)
  • Sarbanes-Oxley Act (SOX) 
  • ITAR (International Traffic in Arms Regulations)
Risks and Vulnerabilities
  • Advanced and persistent attacks 
  • Unauthorized code or access to devices 
  • Use of fraudulent products 
  • Interruption of production 
  • Loss of customer information 
  • Stolen intellectual property
MANUFACTURING IOT SECURITY – AT SCALE

Keyfactor Control makes it easy and affordable to embed high-assurance secure identity in every step of the manufacturing and IoT device lifecycle. Through design, manufacturing, deployment, and ongoing management, Keyfactor Control provides the identity foundation you need to produce and sustain the most secure devices on the market. Whether it’s a controlled update, new certificate configuration, or an unexpected breach, Keyfactor Control facilitates staying on top of your operations and products.

Benefits
With Keyfactor Control You Get:
Secure Code Signing

Signing firmware and software updates are a critical best practice to ensure that the software installed in your devices is genuine.

Installation and Identity Provisioning

Installation of Keyfactor Control and provisioning of a secure and unique identity during the device activation process.

Extensibility

Keyfactor Control empowers one-step automation of certificate and Root of Trust (RoT) management, and is available for embedded Android, and native-C for real-time operating systems.

Centralized Root of Trust Management

Certificates, key stores, and trust stores across all devices, applications, servers and services within the IoT ecosystem.

SDK & API

Incorporate encryption, authentication, and secure code signing within your IoT devices and applications using Keyfactor Control SDKs and APIs.

Extended Identity Attributes

Bind custom attributes to device identities without having to modify, revoke or reissue any certificate.

IoT Ecosystem Integration

APIs and plug-ins allow the IoT ecosystem to authenticate device identities, and enforce granular access control based on extended attributes.

Mass Scalability

Proven in environments of 500-million devices, running either on-premise, in the cloud, or in a custom architected hybrid mode.

Private and Public Certificate Authority

Includes a fully managed private PKI, and supports both internal certificate authorities as well as public issuers such as Certicom, DigiCert, and Entrust.