{"id":11088,"date":"2021-06-10T16:18:47","date_gmt":"2021-06-10T14:18:47","guid":{"rendered":"https:\/\/sertalink.com\/?page_id=11088"},"modified":"2021-06-10T16:18:48","modified_gmt":"2021-06-10T14:18:48","slug":"internet-of-things-embedded-security","status":"publish","type":"page","link":"https:\/\/sertalink.com\/fr\/internet-of-things-embedded-security\/","title":{"rendered":"Internet of Things &#038; Embedded Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.6.6&#8243; custom_padding=&#8221;1px|||||&#8221;][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/04\/Capture.png&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|-22px||2px||&#8221; custom_padding=&#8221;38px|0px||21px||&#8221;]<\/p>\n<h2 class=\"ProductOverview-module--pageTitle--2lQv2\" data-product-name=\"Kaspersky Small Office Security\"><span class=\"ProductOverview-module--surtitle--1Qlcs\" style=\"color: #008080;\">Kaspersky<\/span><span class=\"ProductOverview-module--surtitle--1Qlcs\" style=\"color: #008080;\"><\/span><span class=\"ProductOverview-module--surtitle--1Qlcs\" style=\"color: #008080;\"><\/span><\/h2>\n<h3 class=\"ProductOverview-module--pageTitle--2lQv2\" data-product-name=\"Kaspersky Small Office Security\"><span style=\"color: #000000;\">Internet of Things &amp; Embedded Security<\/span><\/h3>\n<div class=\"PageHeader-module--description--NS_Tg\">Minimizing risk and addressing cybersecurity threats to IoT systems and embedded devices<\/div>\n<div class=\"PageHeader-module--more--1uV3K\"><\/div>\n<div class=\"ProductOverview-module--buttons--1N9p-\">\n<div class=\"ProductOverview-module--button--2hx_v\">\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<div class=\"ProductOverview-module--buttons--1N9p-\">\n<div class=\"ProductOverview-module--button--2hx_v\">\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Capture-42-300&#215;269.png&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;24px&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;#1d7c15&#8243;]<\/p>\n<div class=\"ProductArticles-module--title--36sHb\" style=\"text-align: center;\">Overview<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<div class=\"Article-module--itemWrapper--34nQz\">\n<div class=\"Article-module--item--3P_0U\">\n<div class=\"FormattedHTMLContent-module--host--2o1Qf Article-module--html--32XdA\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">The Internet of Things forms a cornerstone to digital transformation in all industry sectors. It\u2019s already changing world around us in manufacturing, agriculture, city infrastructure, retail and the automotive industry. This latest industrial revolution relies on all its component parts, from sensors to data centers, incorporating interconnected, unassailable defenses against cyberthreats and malicious attacks.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Article-module--itemWrapper--34nQz\">\n<div class=\"Article-module--item--3P_0U\"><\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/iot-overview-img-1.png&#8221; title_text=&#8221;iot-overview-img (1)&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Security by Design&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Total_compatibility-300&#215;300.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243;]<\/p>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Providing all the tools to secure every software and hardware component of your interconnected systems, enabling a fully validated Chain of Trust to be established, without overloading individual systems or devices, or limiting overall flexibility<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Built-in Security at OS level&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/image006.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243;]<\/p>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">The KasperskyOS operating system is designed protect diverse and complex embedded systems from the consequences of malicious code, viruses and hacker attacks, through strong separation and policy enforcement.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Embedded Protection&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/image008-transport.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243;]<\/p>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/overview\" data-at-selector-content-key=\"industrialSolution\">\n<div data-at-selector=\"ent-overview\" class=\"Overview-module--background--3esW7\">\n<div class=\"Overview-module--container--1IIwq\">\n<div class=\"Overview-module--products--2TBGG\">\n<div class=\"Products-module--products--2kFa5\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Harden and protect your Microsoft Windows based embedded devices and computers with a solution created to optimize security for Low-end systems with limited memory capacity, that doesn\u2019t require ongoing maintenance or internet connectivity<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/Anchor\" data-at-selector-content-key=\"anchor\">\n<div class=\"AnchorBase-module--container--acSVV\">\n<div id=\"ent-features\" class=\"AnchorBase-module--anchor--2kiku\"><\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/EntFeatures\" data-at-selector-content-key=\"IndustrialSolution\">\n<div>\n<section class=\"EntFeatures-module--wideBG--3YbTd\" data-at-sector=\"EntFeatures\">\n<div class=\"EntFeatures-module--host--1-eTU\">\n<div class=\"EntFeatures-module--texts--3xiF8\"><\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Automotive security&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/image005.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243;]<\/p>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/overview\" data-at-selector-content-key=\"industrialSolution\">\n<div data-at-selector=\"ent-overview\" class=\"Overview-module--background--3esW7\">\n<div class=\"Overview-module--container--1IIwq\">\n<div class=\"Overview-module--products--2TBGG\">\n<div class=\"Products-module--products--2kFa5\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\"><span>Built-in \u2018Security for Safety\u2019 based on KasperskyOS technology, a single secure gateway into ECUs, and a spectrum of security assessment services addressing the needs of current and future connected vehicles.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/Anchor\" data-at-selector-content-key=\"anchor\">\n<div class=\"AnchorBase-module--container--acSVV\">\n<div id=\"ent-features\" class=\"AnchorBase-module--anchor--2kiku\"><\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/EntFeatures\" data-at-selector-content-key=\"IndustrialSolution\">\n<div>\n<section class=\"EntFeatures-module--wideBG--3YbTd\" data-at-sector=\"EntFeatures\">\n<div class=\"EntFeatures-module--host--1-eTU\">\n<div class=\"EntFeatures-module--texts--3xiF8\"><\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Capture-42-300&#215;269.png&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;24px&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;#1d7c15&#8243;]<\/p>\n<div class=\"ProductArticles-module--title--36sHb\" style=\"text-align: center;\">The use<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Telecommunication equipment&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/iot-01.jpg&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; custom_margin=&#8221;-2px||||false|false&#8221;]<\/p>\n<ul xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<li>Protecting the exploitation of built-in backdoors or known vulnerabilities in firmware<\/li>\n<li>Identifying and preventing\u00a0 unauthorized attempts to modify firmware<\/li>\n<li>Operates autonomously without maintenance or software updates for extended periods of time\u00a0<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Embedded Systems&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/iot-02.jpg&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; custom_margin=&#8221;-2px||||false|false&#8221;]<\/p>\n<ul xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<li>Protection that operates effectively in closed networks without a stable Internet connection<\/li>\n<li>Meeting compliance with Industry Standards<\/li>\n<li>A modular approach with low demands on hardware resources supports legacy and low-end systems<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Automotive&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/iot-03.jpg&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; custom_margin=&#8221;-2px||||false|false&#8221;]<\/p>\n<ul xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<li>Protection of sensitive data (i.e. encryption keys, logs, telematics data) from unauthorized access<\/li>\n<li>Secure boot and protection against the unauthorized modification of firmware and software<\/li>\n<li>Isolation of infotainment from safety critical system (advanced driver assistance systems, AUTOSAR)<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Capture-42-300&#215;269.png&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;24px&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;#1d7c15&#8243;]<\/p>\n<div class=\"ProductArticles-module--title--36sHb\" style=\"text-align: center;\">The Risk<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"Threats-module--description--2HDrx\">\n<div class=\"Threats-module--description--2HDrx\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Embedded devices have traditionally been considered as too operationally remote and disconnected from on-line systems to require high levels of protection. But digital Transformation and the Internet of Things changes everything. Interconnected components need holistic security against threats including:<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/kata-threat-7.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Theft and exploitation of confidential data and user credentials<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/fin-offer-threat-intelligence-security-services.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">The implementation of unauthorized firmware<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/botnet-tracking-black.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/Threats\" data-at-selector-content-key=\"IndustrialSolution\">\n<div class=\"Threats-module--container--2AhuS\" data-at-selector=\"smb-threats\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">User data sniffing, and &#8216;Man-in-the-Middle&#8217; attacks<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/Awards\" data-at-selector-content-key=\"industrialSolution\">\n<div class=\"Awards-module--rootContainer--3c1AS\" data-at-selector=\"ent-awards\">\n<div class=\"Awards-module--container--11RDB\">\n<div class=\"Awards-module--descPart--1i5qf\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/enterprise-new-icons-34.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Ransomware attacks and crypto-malware<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/enterprise-new-icons-18.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;32px|||||&#8221;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Remote access and attacks from mobile devices<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/unknown-attack-vectors-black.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/Threats\" data-at-selector-content-key=\"EmbeddedSecurityInternetOfThings\">\n<div>\n<div class=\"Threats-module--container--2AhuS\" data-at-selector=\"smb-threats\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">The exploitation of applications software vulnerabilities<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/RelatedProducts\" data-at-selector-content-key=\"EmbeddedSecurityInternetOfThings\">\n<div>\n<div class=\"AnchorBase-module--container--acSVV\">\n<div id=\"related-products\" class=\"AnchorBase-module--anchor--2kiku\"><\/div>\n<\/div>\n<section class=\"RelatedProducts-module--container--2t9n8\" data-at-selector=\"related-products\"><\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_button button_url=&#8221;mailto:sales@sertalink.com&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Contact us &#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#000000&#8243; button_border_color=&#8221;#000000&#8243; button_border_radius=&#8221;86px&#8221; button_icon=&#8221;%%3%%&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>Kaspersky Internet of Things &amp; Embedded Security Minimizing risk and addressing cybersecurity threats to IoT systems and embedded devices Overview The Internet of Things forms a cornerstone to digital transformation in all industry sectors. It\u2019s already changing world around us in manufacturing, agriculture, city infrastructure, retail and the automotive industry. This latest industrial revolution relies [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-11088","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Internet of Things &amp; Embedded Security | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet of Things &amp; Embedded Security | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-10T14:18:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/#local-place\"},\"address\":{\"@id\":\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/fr\/#website\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/#webpage\",\"url\":\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/\",\"name\":\"Internet of Things & Embedded Security | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#website\"},\"datePublished\":\"2021-06-10T14:18:47+00:00\",\"dateModified\":\"2021-06-10T14:18:48+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/www.cyberrange.be\/internet-of-things-embedded-security\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/11088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=11088"}],"version-history":[{"count":2,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/11088\/revisions"}],"predecessor-version":[{"id":11091,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/11088\/revisions\/11091"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=11088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}