searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Device Authority

Get our top stories in your inbox

Device Authority KeyScaler 7.0 secures IT to OT environments

November 16, 2022

Device Authority has released a new version of its KeyScaler platform, with features that will further simplify and strengthen its ability to help businesses achieve complete …

Device Authority and Entrust join forces to provide machine identity automation for IoT

March 23, 2022

Device Authority and Entrust have partnered to help businesses remove the logistical challenges of large scale IoT deployment by offering automated Public Key Infrastructure …

Device Authority partners with Trusted Objects to provide a combined solution for IoT Edge devices

January 19, 2022

Device Authority and Trusted Objects announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform. Last year Trusted Objects joined …

Device Authority integrates FIDO FDO with KeyScaler for secure device onboarding

January 13, 2022

Device Authority announces it has integrated FIDO device onboarding (FDO) into the KeyScaler platform. Device onboarding is the process of installing secrets and configuration …

Device Authority raises $2.9M to accelerate revenue growth

December 3, 2021

Device Authority announces a $2.9 million funding round led by Tern PLC, ALP and Venafi. The funding will be used to accelerate the revenue growth of the company through …

Venafi sponsors three new developers from its Machine Identity Protection Development Fund

December 19, 2019

Venafi, the inventor and leading provider of machine identity protection, announced direct sponsorship of three new developers from its Machine Identity Protection Development …

Device Authority and Tech Mahindra deliver IAM and encryption services to IoT customers

June 25, 2019

Device Authority, a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT), announced their strategic partnership with Tech Mahindra, a leading …

Device Authority enhances KeyScaler for Microsoft Azure IoT Hub DPS and Docker

May 15, 2019

Device Authority, a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT), announced two of its latest KeyScaler platform developments with …

IdenTrust and Device Authority alliance to provide secure lifecycle management to the IoT

April 16, 2019

IdenTrust, (part of HID Global), the leading trusted provider of digital certificates, and Device Authority, a global leader in Identity and Access Management (IAM) for the …

Thales and Device Authority healthcare IoT solution ensures device and data security for medical devices

July 12, 2018

Thales and Device Authority announce a jointly developed solution to ensure the authentication of IoT devices and the confidentiality and integrity of the data they rely on – …

Device Authority announces KeyScaler as a service – IoT security in the cloud

June 15, 2018

Device Authority announced its new Software as a Service (SaaS) delivery model for its IoT security platform KeyScaler. KeyScaler as a Service (KSaaS) delivers security and …

Featured news

  • CISA releases free tool for detecting malicious activity in Microsoft cloud environments
  • Top ways attackers are targeting your endpoints
  • Why organizations shouldn’t fold to cybercriminal requests
How to protect online privacy in the age of pixel trackers

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

CISA releases free tool for detecting malicious activity in Microsoft cloud environments

Top ways attackers are targeting your endpoints

Why organizations shouldn’t fold to cybercriminal requests

Fake ChatGPT for Google extension hijacks Facebook accounts

A common user mistake can lead to compromised Okta login credentials

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us