Endpoint Security , Internet of Things Security

How Microsoft's Azure Sphere Tackles IoT Security

Galen Hunt Says Azure Sphere is Built With Security at Forefront
Galen Hunt, distinguished engineer and managing director of Azure Sphere, Microsoft

Microsoft is tackling IoT device security challenges with the Azure Sphere platform. Galen Hunt, Azure Sphere's managing director, describes how the platform draws upon hardware, software and services.

See Also: Webinar | SolarWinds Breach: If Cyber Companies Can Get Hit, Do You Stand A Chance?

Azure Sphere is a Linux-based OS that brings together chip-level security integrations that enforce what kind of applications can run and encryption to ensure a hardware root of trust. It links with Microsoft's cloud services, which handle updates, device verification and other functions.

“In the IoT space, we wanted to allow OEMs [original equipment manufacturers] to build devices and not have to worry about building all this infrastructure for security,” Hunt says.

In this video interview, Hunt discusses:

  • The security concerns around IoT devices.
  • How the Azure Sphere platforms handles patch management.
  • How an innovation from the Xbox, the Pluton subsystem, ensures a hardware root of trust for IoT devices.

Hunt is distinguished engineer and managing director of Azure Sphere. He’s a 23-year veteran of Microsoft, serving in various positions, including partner managing director, partner research manager, principal researcher and senior researcher.

About the Author

Jeremy Kirk

Jeremy Kirk

Managing Editor, Security and Technology, ISMG

Kirk is a veteran journalist who has reported from more than a dozen countries. Based in Sydney, he is Managing Editor for Security and Technology for Information Security Media Group. Prior to ISMG, he worked from London and Sydney covering computer security and privacy for International Data Group. Further back, he covered military affairs from Seoul, South Korea, and general assignment news for his hometown paper in Illinois.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.