Jasper is now part of Cisco

Learn More

Privacy Statement has been updated. Read statement

About Cisco

Jasper is now part of Cisco

Learn More

About Cisco

Privacy Statement has been updated. Read statement

Protecting your IoT business with comprehensive security

CC7-Business-Value-4-Desktop-Listing
CC7-Business-Value-4-Mobile-Main
CC7-Business-Value-4-Mobile-Listing
October 30, 2017

by

Jessica Morales

With cyberattacks and large-scale data breaches dominating the news, companies across every industry are scrambling to tighten up security. If your business is using IoT devices to deliver connected services, you should be at the front of the line.

Threat detection and fraud prevention can make or break your business. You’ll need to feel confident that your IoT devices, customer data, and backend systems are protected. That’s where the multi-layered security capabilities of the Control Center IoT platform can be your greatest ally (and asset).

Protecting your business from fraud

In part 4 of our video tour series on the Control Center connectivity management platform, we spotlight security features that help you reduce risk and prevent fraud. Here are just a few examples:

  • SMS whitelisting. Suppose you want to send SMS text messages to remotely control devices, such as waking them up from a “deep power down.” To ensure your devices will only accept commands from authorized devices or systems, you can set up SMS whitelists. Safeguarding these device communications lowers the risk of tampering or misuse. Cisco Jasper is the first in the industry to offer SMS whitelisting for IoT. To learn more, check out this blog.
  • IMEI whitelisting. Another important way to protect your IoT business is using IMEI whitelists and automated security. IMEI is a unique ID that pairs a SIM with a specific device. You can create IMEI whitelists of approved devices, and an automated rule that says if someone removes the SIM and tries to use it in another device like a phone, Control Center will detect the change and take action, such as deactivating the SIM and alerting your team. It helps ensure your devices are protected and you avoid unexpected data charges.
  • Login security. Of course you also need to secure access to command central. Control Center provides strong-password requirements and two-factor authentication, which requires users to supply a verification code along with their login credentials before they can access the platform.

To learn how you can lower operational costs using Control Center, see part 3 of this blog series. Coming up next, in part 5 we’ll showcase diagnostic tools that give you the agility to find and fix problems fast, even if your devices are on the other side of the globe.

Post a comment

Post a Comment:

Subscribe

By email

Follow Us