Chat with us, powered by LiveChat

The Zeus Security Solution is a complete security system, with multiple branches, that is built on top of AKM.

Zeus Security Solution

Features of Zeus, include, but are not limited to:

  • In-network Automated Configuration
  • Built-in Data Analytics
  • Built-in Intrusion Detection
  • Breach Detection, with automated self-healing

Verticals

  • Transportation
  • Industrial IoT
  • Smart Cities and Factories Infrastructure

Products

Cloud Security

Zeus Public Cloud Network Security is a Cloud to IoT Endpoint product that uses a public cloud to secure communication with IoT endpoints for one of the following types of communication:

  • Individual, unique security relationships between cloud and each IoT endpoint.
  • Multi-point end-to-end capabilities between IoT endpoints (uses public cloud server as passthrough bridge).
  • Or, a combination of the two communication types.

Works with Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

 

Zeus Private Cloud Network Security is a Cloud to IoT Endpoint product that uses the private cloud to secure communication with IoT endpoints for one of the following types of communication:

  • Individual, unique security relationships between cloud and each IoT endpoint.
  • Multi-point end-to-end capabilities between IoT endpoints (uses public cloud server as passthrough bridge)
  • Or, a combination of the two communication types.

Minimal Integration for Linux based private cloud servers.

Local Network Security

Zeus Local Network Security is a local network security product that provides security to IoT endpoints in one of the following types of communication within the local network:

  • Individual, unique security relationships between a Zeus network management gateway and each IoT endpoint.
  • Multi-point, end-to-end encryption between multiple IoT endpoints.
  • Or, a combination of the two communication types.

Support for multiple operating systems, including Linux, Windows, Free RTOS, and Bare Metal implementations.

 

Local Network Security

The Zeus Network Management Gateway is a hardware module that is used to manage a Zeus network implementation. Features of this module, include, but are not limited to:

  • Automatic network security configuration of all endpoints.
  • Aggregation and Analysis of endpoint analytics.
  • Breach Detection based on analytics and other factors
  • Automatic Breach Recovery based upon policy
  • Gateway between endpoints and backend server

Supports Wi-Fi, Bluetooth, Ethernet. Remote HTML based configuration interface. Local Serial port for diagnostics. Built-in secure element.

Security Add-Ons

Zeus Secure SD Card:

  • AKM Enabled Swissbit™ Smart SD card with secure element
  • Can be used with multiple AKM based products, including FileGuard, Zeus VPN, Zeus Secure Boot, Zeus Firmware License Validator, and Zeus Secure Voice
  • 8-GB, 16-GB, 32-GB

Voice Security

Zeus Secure Voice Add-on for Android Phone:

  • Personal End-to-End Encryption for voice communication for one or more endpoints, based on AKM.
  • Android Application
  • Optional Zeus Secure SD Card for greater protection

Individual Security

Zeus Secure VPN:

  • Normal VPN functionality
  • Certificate-free solution based on AKM
  • No centralized authority for security
  • Optional Zeus Secure SD Card for greater security

Power-Line Security

Zeus Secure Smart Meter with PLC Connectivity
The Zeus PLC-E1 Power Line Communication Node has been designed for narrowband interconnectivity over a 230 V, 50 Hz power network. It is based on ARM® Cortex® F4 microcontroller cooperating with a custom-designed analog front-end and mains coupler. Its protocol sup-ports the mesh network approach, enabling data packet forwarding among nodes.

The PLC-E1 utilizes AES256 encryption algorithm and Zeus AKM® Key Management System and Secure Communication Protocol to secure communication channels by creating protected, virtually dedicated conduits between PLC nodes.

The device is compatible with the PLC-X1 Modem – interconnectivity extender of MCS-X2 Modular Control System. Multiple nodes can be connected onto one power line allowing measurement and control over different locations. As a data collector and system manager MCU-X2 together with PLC-X1 device can be used.

The PLC-E1 is suitable for communication in systems where relatively small amounts of data needs to be transferred in a secure and robust way, e.g., in sensor and actuator networks or industrial & home automation.

Applications: Industrial & Home Automation, Smart City Control & Maintenance, Smart Home sensors/actuators interconnectivity.

  • Designed for 230 V AC networks
  • CENELEC BCD bands
  • DBPSK, DQPSK, D8PSK, FSK modulations
  • 100 MHz ARM® Cortex® F4
  • Custom analog quadrature modulator/demodulator
  • Impedance matching and noise measurement used with adaptive link control algorithms
  • Reliable protocol with support for mesh packet forwarding
  • Highly secure communication with AES256 encryption algorithm and Zeus AKM® key management system

Integrity Management

Zeus Secure Boot of IoT Devices
The AKM Secure Boot procedure is used to protect a system against unauthorized modification of hardware or software components. The protection algorithm is based on cooperation between two components – a modified version of the bootloader and an associated Secure Element that can be implemented in form of either a hardware extension module (Hardware Secure Element) or a software module that is installed at the bootloader level (as a function call from the bootloader to the Software Secure Element module).

  • Physically ties device to specific AKM Worldwide Identifier
  • Protects against unauthorized modification of hardware and software components.
  • Can be tied into larger, encompassing integrity management solution.
  • Optional Zeus Secure SD Card for greater protection.
  • Must be integrated into bootloader.

 

The Zeus Asset Integrity Management solution begins with the Zeus Secure Boot process and then transitions into a periodic run-time check procedure that identifies and validates the authenticity of hardware and software components installed within a protected system, as well as to identify and authenticate the subsystems and system for which they are part of in a hierarchically, organized grouping. The latter functionality (the subsystem identification and authentication aspect) is performed after the primary application has been launched and runs as a periodically executed task within it. Additionally, authentication and validation of the subsystem of devices and overall system of multiple subsystems, requires cross-device and cross-subsystem communication.

  • Includes Zeus Secure Boot
  • Hierarchical Component, Device, Subsystem, and System Authentication on an ongoing and periodic basis
  • Synchronization of new/updated components and devices
  • Requires input from configuration management system
  • Requires integration into affected components and devices