Edge devices present a unique set of challenges. They are scaled-down computers, often with highly compact code written in specialized languages, extensively distributed in real-world settings fundamentally unlike the centralized, locked-down environments of modern data centers. They are self-contained and expensive to patch and maintain. And they are a potential back door to every company’s digital assets.
StealthPath’s solution rapidly brings IoT/intelligent devices into full security compliance, without impacting the device performance or requiring any changes to software and infrastructure. Their game-changing approach implements a zero trust-based defense-in-depth. “We challenge every entity, be it an app or a user, trying to initiate a connection with other devices, and we analyze its content before allowing the communication to happen,” says Berkoff. Even if an environment is already penetrated, the StealthPath solution stops it from illicit action, whether it is spreading to other connected systems or beaconing out to download additional malware.
There are three distinct components in the StealthPath solution. Command Intercept, challenges all communication requests, validating that the originating user and application are authorized for the specific device or port connection. This prevents a trusted- but compromised- entity from executing an unauthorized action, like escalating privileges or opening an out-of-profile connection.
Configurations are developed, modified and propagated by StealthProvision, a highly secured, centralized server that is offline except during device updates.
StealthPath provides robust, zero trust endpoint security with zero impact on existing hardware, software, or network infrastructure
For smooth adoption, StealthPath uses MAP, an acronym for its three-stage sequential adoption path. In Monitor, the platform captures all machine-to-machine communications and creates a daily report for detailed analysis and building the foundation for solution configuration. In Alert, StealthPath reports in real time, integrating with existing SIEM systems. This is a simulation mode for enabling testing and optimization of profile configuration. Protect mode turns on the complete set of StealthPath zero trust capabilities.
With multiple approved US and global patents, StealthPath is frictionless to implement, easy to maintain, and coexists with and complements customers’ existing information security solutions. It elegantly addresses a critical vulnerability that will only increase as trillions of new smart devices are embedded everywhere, from advanced aircraft to the energy grid to doorbells.