Gemalto strengthens trust in smart energy with its new end-to-end security solution

496

Gemalto is strengthening trust in the smart energy sector with an end-to-end security solution which protects the entire ecosystem. Deployed by smart meter makers and distribution systems operators, the offer provides seamless connectivity solutions, secure digital identities and security lifecycle management for the long life of smart meters, as threats and stakeholders evolve over time. The solution protects connected energy assets and the data they exchange, allowing people and businesses to trust the expanding smart grid.

Secure smart grids improve sustainability, efficiency and reduce threats

Today’s highly successful smart grids have become comprehensive IoT networks with millions of connected meters that share massive real-time data about people, businesses, and energy consumption. The valuable insight they provide enables consumers to save on energy bills and utilities and energy players to better balance supply and demand. It is also crucial information to help integrate renewable energy sources, helping to improve sustainability. As the marketplace and number of connections continue to expand by an estimated 30% each year1, so does the cyber attack surface. The motivations for hacking this critical infrastructure are high and diverse: energy consumption fraud, insight into households’ activity and absence, grid instability, pressure on governments, ID theft. Digital security is paramount to an efficient grid´s success.

Gemalto protects and secures the expanding smart grid sector

The dedicated Gemalto cybersecurity solution for electric utilities establishes a foundation of trust at the very core of the ecosystem by establishing end-to-end security between energy meters, data concentrators and energy companies’ back-end systems. Rugged and reliable IoT connectivity modules ensure 24/7 data availability. A strong and unique digital identity system is implemented at the manufacturing stage to ensure devices and applications can strongly authenticate themselves, proving their legitimacy to access sensitive data. Leading-edge encryption technology safeguards against data tampering and strong security lifecycle management enable remote security and data access updates, without costly truck rolls.

LEAVE A REPLY