CyberWhiz IoT Cyber Security Solutions for Edge·Mobile·Cloud
Exhibitor: CyberWhiz IoT Cyber Security
Hall/Booth: 5-374
At CyberWhiz, we address the critical challenge of securing IoT ecosystems, which involve three distinct domains: edge devices, mobile applications that are used for monitoring and control those edge devices, and required cloud services.
CyberWhiz Embedded can be embedded into any embedded device whether it has a MCU or MPU. We can work in any kind of operating system from bare metal to RTOS and Emebdded Linux/Android. We also have a secure Bluetooth&Wi-Fi combo module, which has an Elliptic Curve Cryptography based HSM from Microchip, helps IoT device manufacturers to be 100% compliant to pcoming regulations like Radio Equipment Directive(RED) DA and Cyber Resilience Act(CRA) very easily.
CyberWhiz Mobile secure any kind of mobile application that is used to control/monitor and that device, independent from whether it is designed with Native iOS&Android, React Native or Flutter, with less than a 1 minute. It is just a one line of code integrated into the mobile application, and then making it 100% OWASP Mobile Top 10. This will help not to have any vulnerability in end-to-end IoT ecosystem during penetratoin tests because CyberWhiz Mobile increases the cyber resilience of the mobile application a lot and it cannot be bypassed. So IoT device manufacturer should not necessarily declare any known vulnerability.
Finally, CyberWhiz Defence Center can monitor and edge device and/or mobile application in the field continuously during the lifecycle of the IoT product in the field, and detects instantly if there is an attack and cyber anomaly at the edge device and/or its mobile application. Accordingly, related IoT manufacturer is being informed immediately.
With integrating our softwares and/or hardwares into their edge devices and/or mobile applications, IoT device manufacturers will have an end-to-end secure ecosystem for the sustainability and the continuity of their businesses while having a privilige of monitoring their devices' cyber state continuosuly in the field.
Website of the product and the company