Proving the Business Case for the Internet of Things

PodM2M makes security standard on connectivity products

Steve Rogerson
January 9, 2019

PodM2M announced IoT security monitoring and threat detection as standard on all its connectivity products at this week’s Consumer Electronics Show in Las Vegas.
Pod Protect uses machine learning to detect anomalies and secure IoT networks from increasingly sophisticated security threats.
PodM2M, a division of UK-based Pod Group, is a mobile virtual network operator (MVNO) specialising in global connectivity for the IoT market. At CES, it launched its IoT monitoring and threat detection offering, Pod Protect, that is now included as standard on all its IoT connectivity products. 
Security is one of the biggest barriers to the uptake of the IoT and, with hackers becoming more sophisticated, the risks are increasing. Securing devices in the field is problematic, particularly with large scale, global deployments.
Pod Protect enables constant monitoring of the IoT network, using a machine learning algorithm and layered approach to combat even the most sophisticated attacks, enabling users to detect threats before they affect IoT devices and react quickly to protect their network. It is quickly and easily installed via a probe on the network, without the need for an agent on the device side.
Once installed, it uses a three-layered threat detection strategy, including signature-based and anomaly-based monitoring and heuristics to detect suspicious device behaviour. False positives are reduced by using a machine-learning algorithm to analyse normal device behaviour and compare this with a global sensor network, making it sensitive enough to pick up even the smallest indication that a hacker may be lying latent on the network.
“IoT devices are notoriously hard to secure, due to their small form factor and limited computational power,” said Sam Colley (pictured second from the right on the Pod stand at CES), CEO of Pod Group in the USA. “Software patching of devices can be costly and risky, especially if devices are deployed across a wide geographical area. For this reason, we are delighted to provide Pod Protect as standard on all our connectivity packages at no extra cost. Pod Protect provides a layer of security across the whole IoT network, by enabling constant monitoring of data transmissions for billions of devices in real time. This will allow our customers to scale their IoT deployments securely, as well as providing access to real-time threat databases to ensure detection of the latest threats and in-depth analytics via an intuitive dashboard on our platform.”
At CES, PodM2M is providing free security health checks, including a free trial of Pod Connectivity with Pod Protect built in, and an analysis of existing threats on IoT networks.
The picture of the Pod stand shows from left to right Silvain Pelchat and Nancy Laxson from Pod’s customer Laxson GPS, with Colley and David Hambling, CEO of Pod Group in Asia-Pacific.