our
solutions

Existing and emerging IoT concepts may differ in their approach, but they all share three basic domains: the devices, the network and the platform with related applications.

Security of these domains should not be considered an afterthought. Using high-level cryptography it should be designed from the beginning as a fundamental element across any IoT deployment.

At achelos IoT we understand that a secure system is the sum of many parts. Our solutions focus on three specific areas: compliance and robustness of communication channels, secure management of connectivity credentials and embedded high-security operating systems and applications.



secure
connectivity
management

achelos IoT offers network operators, OEMs and large IoT service providers a GSMA-compliant, integrated solution for secure remote provisioning of mobile subscriptions for network authentication.

The platform enables management of embedded SIMs (eSIM) and can similarly be used to manage traditional SIM cards, supported by purpose-built on-card applications. We can easily enable any customer interested in trying out the eSIM technology with an out-of-the-box deployment in AWS (Amazon Web Service).

Our modular connectivity management components and their interoperability ensure that network growth, scalability and future releases and technology standards can easily be accommodated; from GSM, UMTS and LTE to 5G.



protocol
compliance & robustness

The Internet of Things is based on many new software developments. This requires a security by design approach and a holistic view on security to support the authentication, authorisation and privacy of data. Hence the data has to be protected along the whole value chain of IoT business models.

TLS and IKE/IPsec are de-facto standards for secure networks with the aim of protecting data. Robust implementation and correct use of libraries are a major challenge with the variety of options being so extensive that loopholes for attackers easily arise during integration and later configuration.

achelos IoT provides powerful test tools to find gaps and errors, safeguarding that network connections are secure according to well-established standards for different industries such as health, transportation and energy.



embedded
development

At achelos IoT, we have developed a number of high security operating systems for the international market, using a variety of system architectures, IC’s and cryptographic libraries for both contact-based and contactless products.

We provide various embedded simulations and test products to ensure that the quality requirements of our clients are fulfilled to the highest standard by executing module, integration and system testing.

Based on our profound OS expertise, we are also a trusted partner when it comes to the development of applications for embedded systems covering a diverse set of market segments.



security
consulting and services

Security consulting and services in line with the GSMA IoT Security Guidelines

achelos supports customers to assess and to improve the security of their overall IoT system. The Service is based on the GSMA IoT Security Guidelines (CLP.12 for IoT Service Ecosystems and CLP.13 for IoT Endpoint Ecosystems) and the GSMA IoT Security Assessment Checklist (CLP.17).

 

GSMA