An end-to-end security platform specifically designed for IoT devices, an end-to-end secure ecosystem and a secure storage for AI models
Periphery Insights & Detect
Exhibitor: Periphery
Hall/Booth: 2-412
The cost of cybercrime globally is projected to hit $10.5 trillion annually by 2025, with critical infrastructure increasingly becoming a target. IoT devices in sectors like energy, defence, and healthcare are particularly vulnerable due to their limited security capabilities and growing regulatory pressures. New regulations like the EU Cyber Resilience Act (CRA) and NIS2 directive now demand robust cybersecurity measures, creating urgent challenges for manufacturers. Failure to comply can result in significant fines, market access delays, and reputational damage. A 2023 study found that the cost of compliance alone can exceed $1.5 million per product for companies operating in highly regulated environments, excluding the cost of responding to breaches, which averages $4.5 million.
Periphery addresses this urgent need by providing an end-to-end security platform specifically designed for IoT devices. Our solution accelerates time-to-market by streamlining compliance processes, including SBOM risk analysis, and ensures devices are secure post-deployment with real-time monitoring powered by proprietary machinelearning models. By addressing the dual challenges of evolving threats and rising regulatory demands, Periphery empowers manufacturers to protect their devices and secure their place in the market.
Our platform addresses significant gaps left by both network-based and embedded IoT security solutions. Network-based tools monitor traffic but miss critical host-level data, which is where most threats emerge and where the greatest impact can be achieved by stopping malicious activity early. Current embedded solutions, while assisting with secure coding and hardening firmware during development, fail to address operational security once devices are deployed. These solutions are static, unable to detect evolving threats or adapt to new risks, leaving devices vulnerable in real-world environments.
Unlike traditional embedded solutions, our platform evolves with the device. Our Central AI continuously updates threat intelligence, automates compliance alignment, and eliminates the need for manual configuration or rule updates.