- Trusted device identities pre-injected into IoT devices at Thales secure production facilities. This streamlines the OEM production setup, eliminates the need for IoT developers to deploy their own secure production facilities, and simultaneously defends against device cloning or ID theft in unsecured environments.
- Trusted Identity validation and enrolment in IoT clouds such as Azure and AWS leveraging the award-winning Thales Trusted Key Manager (TKM). A PKI framework and trustful embedded keys and certificates streamline enrolment into any IoT cloud platform. It also encrypts and digitally signs data ensuring confidentiality (data is protected against unauthorized access) and integrity (data is accurate and has not been manipulated.)
- Identity lifecycle management, including remote rotation, transfer or revocation of keys and credentials through a single pane-of-glass. The TKM ensures that lifecycle updates are performed securely, over-the-air virtually eliminating the need for onsite support by maintenance teams. This reduces costs, particularly for large, geographically dispersed fleets.
The result?
Cinterion Trusted Identity Services ensure data confidentiality and integrity while safeguarding the complete data-to-cloud journey for the lifetime of devices. This takes the security burden off of IoT providers allowing them to focus on their key competencies and expertise.

Can digital IDs and keys secure the IoT?
GSMA Intelligence is predicting 13 billion new IoT connections by 2025, and with that comes a surging risk for cyberattacks. It’s up to IoT developers and service providers to deliver solutions that properly balance risk, threats and security technology costs. Should you go with it alone or call an expert for help?
A new Thales whitepaper examines the principles and best practices of device identity and authentication technology, which hold a key to safeguarding devices, data and the IoT.
Lifecycle management services to connect, optimize, update and secure your IoT devices