
RutOS Security
Wednesday, 15 September 2021 at 12:00:00 UTC
High-security standards are an essential requirement for Teltonika Networks products. Our devices have multiple security features embedded into the RutOS for reliable protection against cybersecurity threats. For this reason, we continually improve and update our software. Join our webinar and find out all about the newest RutOS security features!


SPEAKERS
Questions & Answers
Attacks are made to elements with most gains, while routers have remote management from central hub, this makes the management web as prime target, if your service is compromised, will it affect every router managed via it, or will it be separated to lot of sandboxes that attacker needs to open separetly ? This question is about RMS, just wanted to get clear picture, cause RMS presents a big target.
RMS service is running on AWS cloud servers, so it is highly unlikely for any potentially malicious 3rd party to get access. On top of this, RMS architecture does not allow to inject any malicious code and gain access to the routers.
Secure boot. Can you repeat the trust in the boot process
Secure Boot is a verification mechanism to ensure that only trusted firmware will be launched on the device. Secure boot devices are equipped with hardware root of trust which contains the keys used for cryptographic functions and in that way it enables a secure boot process. Secure boot process in the first step checks integrity and authenticity of bootloader every boot, then checks integrity and authenticity of firmware every boot and only after that verified firmware is started.
How to purchase?
Please contact your sales manager.
WEBINAR RECORDINGS

Libera el potencial del 5G en Latinoamérica: Descubre el portafolio y los casos de uso de Teltonika

Name S.

+1
Speakers
es

Transforming Transportation & Urban Spaces with IoT

Name S.

+1
Speakers
en

APAC Exclusive - Introducing the ATRM50

Name S.

+1
Speakers
en