The management system is built upon a clear idea of simple and effective life-cycle management of all devices concerned. The management system will manage and control the IoT security proxy and not the device itself.
New tech, same skills
The customer sets desired security levels and a catalogue of policies before initiating deployment which then can be done in steps or all in one go.
Access for the chosen ones
The management system will collect and store traffic data, including log-on attempts and disconnected sessions. It will also hold information about each connected and secured device for later analysis according to customer needs.