Ensure identity and security when everything is connected

Edge computing in support of constrained devices needs a supportive identity paradigm. Nulli has developed and deployed such a paradigm by working closely with client hardware teams to secure their edge devices. Authenticity of devices based on a secure identity registry allows the implementation of a secure communication channel for constrained networked devices, humans and processes. Nulli is able to provide tightly integrated views of device, human, process and condition based relationships.

No Results