end-to-end system to detect and protect against IOT security threats

Autonomous Cyber Defender detects and protects against IOT security threats. Built on nquiringminds’ TDX-Edge router platform it uses a mixture of collaborative data sharing and advanced cognitive analytics to intelligently and autonomously calibrate and act on existing security threats. TDX-Edge is next generation router technology with advanced Cyber defence capabilities. This technology can be integrated with pre-existing routers or supplied as an integrated hardware solution

nquiringMinds is doing really exciting work through the internet of things to transform urban environments. Harnessing the power of technology and the internet is vital for the future of British prosperity. And I am delighted I will be able to help nquiringminds seek new opportunities for its business in one of the world’s fastest growing markets
Theresa May

UK Prime Minister, November 7, 2016

Awards:

Most Innovative Idea at the Ministry of Defence’s AI Hackathon on Enabling Defence Decisions November 2017 at the Geovation centre, London.
Promoted as one of only 3 companies demonstrating best of British Innovation at MWC 2017

Cisco Top 15 Company in IOT

Winner of Entrepreneurs Unite Cyber Savvy Company of the Year Award 2016 for our work on Cloud and IOT security
UK Prime Minister (Theresa May) selected NquiringMinds to represent best of UK Innovation on her first ever trade mission.

core benefits

Supervise

Monitor security relevant activity across multiple router instances.

Dynamic, contextually enhanced inventory

understand whats on your network.

Deployable

Support IP and Non-IP heterogeneous networking.

Data sharing

implements multiple workflows for dynamically sharing threat intelligence both within and across organisations.

Zero trust

Embodies Zero trust principles.

Data source

integrates multiple IOT data source and threat intelligence.

Cognitive inferencing model

intelligently and continuously identify and assess security threats.

securing memory

Using ARM Morello secure network by design to reduce the threat and scale of remotely initiated cyber attacks, securing the network against memory based vulnerabilities.

 

  • End point protection: Each end point device can only ever be remotely attacked via the network gateway.
  • Router vulnerability: A vulnerability in a router has a magnification effect; a router sits across many devices.
  • Router jump off: The infected router can be used as a launch pad to impact any other device on the network.
  • Router defence: Device on an internal network are assuming router defences are in place as umbrella protection.
  • Kernel: Networking components often have high privileged, kernel level access.

lifecycle management

Network-layer onboarding of an IoT device is the provisioning of network credentials to that device. The current lack of trusted IoT device onboarding processes leaves many networks vulnerable to having unauthorized devices connect to them. It also leaves devices vulnerable to being taken over by networks that are not authorized to onboard them. This project will focus on approaches to trusted network-layer onboarding of IoT devices and lifecycle management of the devices. The consortium will build a trusted network-layer onboarding solution example using commercially available technology that will address a set of cybersecurity challenges aligned to the NIST Cybersecurity Framework.

deployments

TDX Cyber can be deployed in a number of different configurations.

 

  • TDX-Edge (software): the cyber defence middleware is installed as a software image on pre-existing routers and devices
  • TDX-Edge (hardware): the full appliance is provided, pre integrated with well known hardware modules. This can be further hardened with custom hardware integration (secure boot, secure storage and secure processing)
  • TDX-Cloud (public): the cloud processing elements can be provided on public cloud installations (AWS, Azure etc)
  • TDX-Cloud (private): the cloud processing elements are provisioned on the customers in house technology

standards compliance

nquiringminds are actively participating in the ManySecured Initiative, which is defining interoperable standards for sharing IOT security data. TDX Cybner is the preeminent reference implementation of these standards. We are also active contributors to a number of open source projects that complement these activities.