Welcome!

News Feed Item

WISeKey to Integrate Artificial Intelligence at Chip Level into Its IoT Cybersecurity Vertical Platform

WISeKey International Holding Ltd (WIHN.SW) (“WISeKey”), a leading Cybersecurity and IoT company, today announced its new platform - WISeAI – which will be integrating the Root of Trust and IoT embedded devices with problem-solving Artificial Intelligence (“AI”) solution into WISeKey’s Vertical Platform.

While IoT remains wildly insecure, thanks to the integrated solution operated by the WISeKey Vertical Platform, IoT devices would be able to organize themselves into trusted networks based on mutual authentication, identity and integrity. This trusted cybersecurity platform will only enable IoT devices which can provide a recognized identity and a valid integrity report to communicate with peer devices that are part of the trusted community.

Adding AI at the chip level together with the WISeKey RoT it will allow the IoT to provide authenticated sensor data. Current IoT data do not provide value for their manufacturers unless it can be converted into actionable, contextualized information generated by IoT sensors fully identifiable. The majority of IoT devices are not built with embedded secured systems thus are very vulnerable. By integrating AI into the WISekey RoT and Vertical Platform, objects can develop their own cybersecurity behavior, thus making smarter and safer decisions. IoT objects with this technology will learn from attacks, defend them and transfer this intelligence via the WISekey Vertical Platform to other IoT objects pear to pear using a blockchain.

WISekey will include AI solution at the integrated circuits allowing AI to be hosted on a hardware vault with the highest level of certification able to encrypt communications and authenticate the devices. This will also allow AI to leverage the massive big data generated by the deployment of WISeKey’s RoT now embedded in more than 2.5 billion devices worldwide benefitting from the strong cryptographic capabilities deployed in all sorts of IoT products.

Addressing fast growing IoT market

The ability to authenticate and remotely manage millions of networked, automated devices and equipment is becoming pervasive − from factory floors, to hospital operating rooms, to residential homes – including billions of objects and devices from refrigerators, watches, wearables to wine bottles – everything that can connect and communicate via the Internet.

The IoT security market is expected to grow from $6.89 billion in 2015 to nearly $29 billion by 2020 according to a report published by Markets and Markets, thus growing at an annual rate of 35%. These massively deployed connected objects are facing regular attacks hence generating a large need for trusted end-to-end cybersecurity solutions. This problem is affecting billions of people and IoT devices worldwide, and manufactures of these devices could be forced or incentivized to spend money to make their devices secure, as regulators might impose liabilities on them.

Our computers and smartphones are as secure as they are because there are teams of specialized security experts working in companies like Google, Microsoft, Apple etc. ensuring their customers are protected. These companies spend a lot of time testing their code before it's released, and quickly patch vulnerabilities when they're discovered. Those companies can support such teams because those companies make a huge amount of money, either directly or indirectly, from their software—and, in part, compete on its security. This isn't true for IoT hardware manufacturers putting unprotected IoT on the market sold at a much lower margin, and are often built by offshore third parties. The companies involved simply don't have the expertise to make them secure.

“The combination of IoT Cybersecurity technologies developed by WISekey with Artificial Intelligence solutions are a game changer in our industry. This new platform opens up many possibilities for improving the overall security functionalities and creating new business processes by taking advantage of the world of digital identification at the object level, which once combined with big-data allows us to gather and process all available information and generate actionable insights," said Carlos Moreira, Founder and CE WISeKey.

About WISeKey

WISeKey (SIX Swiss Exchange:WIHN) is a leading cybersecurity company and selected as a World Economic Forum Global Growth Company. WISeKey is currently deploying large scale Internet of Things (“IoT”) digital identity ecosystems and has become a pioneer of the “4th Industrial Revolution” movement launched this year at the World Economic Forum in Davos. WISeKey’s Swiss based cryptographic Root of Trust (“RoT”) integrates wearable technology with secure authentication and identification, in both physical and virtual environments, and empowers IoT and wearable devices to become secure transactional devices. The RoT serves as a common trust anchor, which is recognized by the operating system and applications, to ensure the authenticity, confidentiality and integrity of on-line transactions. With the cryptographic RoT embedded on the device, the IoT product manufacturers can use code-signing certificates and a cloud-based signature as a service to secure interactions among objects and between objects and people. WISeKey has patented this process in the USA as it is currently used by many IoT providers.

Disclaimer:

This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties and other factors, which could cause the actual results, financial condition, performance or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise. This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is, or shall be relied on as, a promise or representation as to the future performance of WISeKey.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
So the dumpster is on fire. Again. The site's down. Your boss's face is an ever-deepening purple. And you begin debating whether you should join the #incident channel or call an ambulance to deal with his impending stroke. Yes, we know this is a developer's fault. There's plenty of time for blame later. Postmortems have a macabre name because they were once intended to be Viking-like funerals for someone's job. But we're civilized now. Sort of. So we call them post-incident reviews. Fires are ne...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Hackers took three days to identify and exploit a known vulnerability in Equifax’s web applications. I will share new data that reveals why three days (at most) is the new normal for DevSecOps teams to move new business /security requirements from design into production. This session aims to enlighten DevOps teams, security and development professionals by sharing results from the 4th annual State of the Software Supply Chain Report -- a blend of public and proprietary data with expert researc...
CloudEXPO New York 2018, colocated with DevOpsSUMMIT and DXWorldEXPO New York 2018 will be held November 12-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI and Machine Learning to one location.
DXWorldEXPO LLC announced today that Nutanix has been named "Platinum Sponsor" of CloudEXPO | DevOpsSUMMIT | DXWorldEXPO New York, which will take place November 12-13, 2018 in New York City. Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix Enterprise Cloud Platform blends web-scale engineering and consumer-grade design to natively converge server, storage, virtualization and networking into a resilient, softwar...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Authorization of web applications developed in the cloud is a fundamental problem for security, yet companies often build solutions from scratch, which is error prone and impedes time to market. This talk shows developers how they can (instead) build on-top of community-owned projects and frameworks for better security.Whether you build software for enterprises, mobile, or internal microservices, security is important. Standards like SAML, OIDC, and SPIFFE help you solve identity and authenticat...