Improve your operational efficiency while minimizing your reputational and financial risks

Edge Computing you can trust.

Request a Demo
Business continuity
Avoid revenue loss due to downtime.
Brand Reputation
Minimise the risk of reputation damage.
ROI
Obtain a fast Return-On-Investment.
MAIN SECURITY FEATURES

Raise the security level of your Edge deployments

Edge Gateway Hardening

Device in-depth defense with no user/pass access, closed ports, no incoming communication channels, and secured outgoing channels.

Data Encryption

All user data stored in the device, whether running or shut down, or sent through any network is encrypted with compliant industry standards.

Unique Certificates

The authentication and authorisation of each of the participants in our communication system is secured by cryptographic certificates unique to each device.

Provisioning System

Secured first boot sequence where both the initial state of the device and its final communication certificates are configured.

OTHER SECURITY FEATURES

All the features: Zero trust

Secure Boot

Our Edge Gateways only boot trusted firmware. Barbara performs a series of cryptographic algorithms at start-up to ensure the software has not been modified by third parties.

TPM Support

Our system can verify the signatures of the firmware against the certificates or encryption keys stored in the TPM (Trusted Platform Module).

System Integrity

Barbara monitors errors and unwanted events, allowing you to analyse and identify potential attacks and security-related events and to carry out preventive maintenance.

Role-Based Access

Device and data access is segmented in permissions and roles. This segmentation is key to prevent the risk of unwanted privilege escalation.

Compliance

Implemented following the recommendations of organisations such as the GSMA, OWASP or the Industrial Internet Consortium (IIC) and industry standards such as IEC-62443. It also has a policy of patching critical vulnerabilities within 72 hours.

Data Sovereignty

Barbara moves your data around without looking into it. Our platform does not step into the user plane, so you keep full ownership and privacy. Your data is yours. Full stop.

Get to know all the features of the Platform

Download
blog posts

Learn more about the importance of cybersecurity

Cybersecurity in industrial companies in Spain: analysis, challenges and solutions.

Cybersecurity is increasingly becoming a fundamental part of every company's strategy. However, for industrial companies operating with state-of-the-art technology, it is a key business element. As these are infrastructures that can be "critical" in the event of a cyberattack, companies that have manufacturing in their core business must be very aware that, if they do not have a medium-term digital plan, they are an "easy target" for organized networks of cybercriminals. Something that could be solved with cybersecurity systems based on artificial intelligence at the edge.

Cybersecurity

Impact of Edge Computing on Industrial Cybersecurity

Edge computing, or the ability to store and process data on servers close to the source or destination of that data, is becoming increasingly fashionable. The IT world has been using it for years with regional data centers that serve content more efficiently. What is new today is the beginning of its incursion into industrial environments.

Cybersecurity

IoT hyperconnectivity and obsolescence, the main cyber-attack risks for the industrial sector

These are the conclusions reached by Barbara, which presents research on cybersecurity in this sector. Forty percent of industrial organizations have already experienced at least one security incident in the last year, with the industrial and energy sectors being the most vulnerable.

Cybersecurity