Welcome!

News Feed Item

WISeKey and OISTE.ORG Localizes Its Cryptographic Root of Trust in India and Creates a New National RoT / CA to Bring Security to India Internet Ecosystems (People and the Connected Devices)

WISeKey International Holding Ltd. (WIHN.SW), a leading Swiss cybersecurity and IoT company, today announced that it has completed the localization of its Cryptographic Root of Trust in India, which enables the provision of digital identities to persons and secure devices connected to the “Internet of Things”. The WISeKey Indian localization brings innovative security solutions that, together with the OISTE unique trust model, brings complete end-to-end cybersecurity solutions to protect the interactions of persons, applications and connected devices.

WISeKey’s technology includes both the required software and hardware components to provide strong dual factor authentication and microchips to be embedded into all types of “Secure Things” on diverse industries such as distribution of products, anti-counterfeiting, smart cars, home security controls, video cameras, etc. WISeKey Semiconductors products (VaultIC product line), are a perfect solution for IoT device manufacturers requiring a state-of-the-art security coverage on all network types. Designed for low cost, power and surface constrained devices, it proposes industry standard connectivity, very low power consumption and a minimum footprint, and it’s offered together with the WISeKey software PKI products and services, which provide the digital identity to authenticate devices.

The localized PKI deployment will also enable needs for other business needs, both in the private and public sectors. Most of the projects under the Ministry of electrics and Information Technology (MeitY) and Ministry of Urban Development like Mobile Identity based DBT (Direct Benefit Transfers), Jan Dhan Yojna, ESign, eGov, eSampark, Social Media etc., require execution of the Digital Core of these modernization programs. WISeKey PKI technology enables easy to use digital signatures and encryption, which are fundamental building blocks for secure online transactions. WISeKey will also localize its offering for secure Mobile Solutions, like the WISeID Personal Cloud. WISeKey also has relevant applications in the private enterprise space. The digital payment initiative, backed by the GOI, is a compelling reason for a lot of private sector banks, e-commerce companies, and Telecom service providers, to adopt stringent Trusted Identity based security solutions, which again would have WISeKey PKI technology and the building block.

WISeKey is currently deploying large scale IoT digital identities and chips for connected devices all over the world using its Cryptographic Root of Trust and secure semiconductors technology. With the Cryptographic Root of Trust embedded on the device, the IoT product manufacturers can use code-signing certificates and a cloud-based signature-as-a-service, to secure interactions among objects and between objects and people.

At the heart of this strategy is the OISTE-WISeKey Cryptographic Root of Trust which has been actively used since 1999 by over 2.6 billion desktops, browsers, mobile devices, SSL certificates and Internet of Things’ devices. The OISTE WISeKey Cryptographic Root of Trust is ubiquitous and universal, and a pioneer in the identification of objects.

About WISeKey

WISeKey (SIX Swiss Exchange: WIHN) is a leading cybersecurity company currently deploying large scale Internet of Things (“IoT”) digital identity ecosystems and has become a pioneer of the “4th Industrial Revolution”. WISeKey’s Swiss based cryptographic Root of Trust (“RoT”) integrates wearable technology with secure authentication and identification, in both physical and virtual environments, and empowers IoT and wearable devices to become secure transactional devices. The RoT serves as a common trust anchor, which is recognized by the operating system and applications, to ensure the authenticity, confidentiality and integrity of on-line transactions. With the cryptographic RoT embedded on the device, the IoT product manufacturers can use code-signing certificates and a cloud-based signature as a service to secure interactions among objects and between objects and people. WISeKey has patented this process in the USA as it is currently used by many IoT providers.

To receive WISeKey’s latest news, subscribe to our Newsletter or visit the WISeKey Investors Corner.

Disclaimer:

This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties and other factors, which could cause the actual results, financial condition, performance or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise.

This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is, or shall be relied on as, a promise or representation as to the future performance of WISeKey.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...
Cloud applications are seeing a deluge of requests to support the exploding advanced analytics market. “Open analytics” is the emerging strategy to deliver that data through an open data access layer, in the cloud, to be directly consumed by external analytics tools and popular programming languages. An increasing number of data engineers and data scientists use a variety of platforms and advanced analytics languages such as SAS, R, Python and Java, as well as frameworks such as Hadoop and Spark...
"We are a monitoring company. We work with Salesforce, BBC, and quite a few other big logos. We basically provide monitoring for them, structure for their cloud services and we fit into the DevOps world" explained David Gildeh, Co-founder and CEO of Outlyer, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Automation is enabling enterprises to design, deploy, and manage more complex, hybrid cloud environments. Yet the people who manage these environments must be trained in and understanding these environments better than ever before. A new era of analytics and cognitive computing is adding intelligence, but also more complexity, to these cloud environments. How smart is your cloud? How smart should it be? In this power panel at 20th Cloud Expo, moderated by Conference Chair Roger Strukhoff, paneli...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Join us at Cloud Expo June 6-8 to find out how to securely connect your cloud app to any cloud or on-premises data source – without complex firewall changes. More users are demanding access to on-premises data from their cloud applications. It’s no longer a “nice-to-have” but an important differentiator that drives competitive advantages. It’s the new “must have” in the hybrid era. Users want capabilities that give them a unified view of the data to get closer to customers and grow business. The...
Cloud promises the agility required by today’s digital businesses. As organizations adopt cloud based infrastructures and services, their IT resources become increasingly dynamic and hybrid in nature. Managing these require modern IT operations and tools. In his session at 20th Cloud Expo, Raj Sundaram, Senior Principal Product Manager at CA Technologies, will discuss how to modernize your IT operations in order to proactively manage your hybrid cloud and IT environments. He will be sharing bes...
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists loo...