Stand Apart. Prioritize Security.

Advanced security platform for IoT manufacturers.

Sign Up

CPX is a security management solution designed exclusively for connected products and the Internet of Things (IoT).

  • Assesses the security of a manufacturer’s connected product
  • Manages security over the product’s entire product lifecycle, from design to test to operations
  • Provides a holistic security framework that covers the entire IOT system including the edge device, communication software, gateways, cloud infrastructure and applications.
  • Detects security exposures before a product launches
  • Manages remediation priorities to minimize risk
  • Monitors the connected product in its operational environment once deployed by a customer

CPX Holistic Approach

Venn diagram

Continuous

CPX covers the entire product lifecycle, from design to test to customer deployment monitoring.

Continuous Cycle

Complete

CPX covers the end-to-end system including the connected product, embedded edge device, communication software, gateways, cloud infrastructure and applications.

Process

Complete

CPX covers the end-to-end system including the connected product, embedded edge device, communication software, gateways, cloud infrastructure and applications.

Comprehensive

CPX is a single solution to assess, manage and demonstrate the security of a connected product.

Comprehensive Solution

Assess

Evaluate the entirety of your solution and attack surface.

CPX Assessment Categories & Examples

  • Device – Is data encrypted at rest?
  • Supply Chain – Is the bill of materials known?
  • Updates – Is the operating system up to date?
  • Identity & Access Management – Are the certificates current?
  • Cryptography & Communication – Are communications encrypted?
  • Configuration – Is the firewall enabled?
  • Monitoring – Are the devices and system being monitored?
  • Process – Have vulnerability scans been run?
  • Incident Handling – Is there an incident handling procedure?
  • Other – Are commands that can be sent to the device managed?

Manage

Manage and prioritize responses to the identified threats and attacks.

CPX Dashboard

Dashboard

CPX provides a holistic view of IoT security via a single visual dashboard of system components that shows issues, security scores and alerts.

Demonstrate

Independently prove and demonstrate your connected product and IoT system are secure.

CPX Reporting

Compliance

CPX provides security scoring, compliance reporting, benchmarking and customer reporting.

 

How CPX Works

Data Sources

  • Device  |  
  • Gateway  |  
  • Platform  

CPX Data Collection

  • 3rd Party Software
  • Configurations
  • Code
  • Libraries
  • Telemetry
  • Logs
  • Network

CPX Framework & Security Engine

    • Security Measurement Analysis

 

 

  • Machine Learning Anomaly Detection

 

  • Threat Detection Lab

 

  • Scoring Algorithms

CPX Dashboard

  • Vulnerabilities
  • Threats
  • Misconfigurations
  • Policy Weaknesses
  • Anomalous Behavior
  • Attacks

CPX Reporting

  • Alerting
  • Scoring
  • Benchmarking
  • Compliance

Why Customers Use CPX

  • Provides best practices framework to a secure connected product
  • Confirms IoT solution designed and developed in a secure way
  • Verifies underlying 3rd party software and custom code is secure
  • Verifies installation configured correctly
  • Verifies that the customer-deployed solution is being used in the recommended secure fashion
  • Monitors suspicious behavior
  • Manages a remediation plan