ROBUST permits new IoT Solutions 

ROBUST software is so miniatured it can run on a single tiny chip. This enables a whole new level of IoT solutions.

This unique miniaturization of ROBUST enables a new kind of Edge 2 Cloud system by providing an IoT framework that handles all components starting from the edge devices that reside in the physical world to the cloud itself. Our solutions are based on the following building blocks: Edge Computing, Sensor Fusion, Cyber-Security, Cloud Computing, Edge2Cloud Software, IIoT Hardware and OT & IT Fusion.


Triple-Security of IoT Systems

Cyber-security of IoT systems is a challenge much greater than securing a common combination of personal devices and cloud services. This is because IoT system require a much tighter integration of hardware, software and network components that were never designed to work together. Simply put, the root cause of most security problems is 'fragmentation'--cracks that provide many ‘doors’ that cyber hackers can attempt to open. Unfortunately, opening these doors has become too easy to do. For example, as demonstrated last fall at the Def Con Conference, savvy hackers can break into various voting devices in a matter of minutes, without any prior preparation at all. Breaking into dumb IoT sensors and devices with no capacity for security is even easier, and the the number of targets on the IoT is potentially vastly greater.

Fragmentation exists at all levels: software, hardware and networks. Fixing one link in the fragmented chain merely moves the vulnerability to the next weakest link. Overall security will not improve unless we design end-to-end systems that eliminate all points of fragmentation and secure all the piece-parts as a unified whole.

ROBUST's platform allows the creation of this new kind of end-to-end system, one working across software, hardware and networks. This multi-tiered approach closes 90% of the ‘doors’ that fragmented systems leave open. It will also isolate any remaining penetrations to limit their expansion. It has the potential to provide a game-changing level of protection.

Software

ROBUST's software architecture eliminates the 'doors' hackers use at the software level.

Hardware

ROBUST permits custom hardware that closes doors hackers use at the hardware level.

Network

Expertise in the ROBUST team permits the elimination of doors hackers use at the network level.