Improve your operational efficiency while minimizing your reputational and financial risks

Edge Computing you can trust.

Request a Demo
Business continuity
Avoid revenue loss due to downtime.
Brand Reputation
Your data is yours. Full stop.
ROI
Obtain a fast Return-On-Investment.
MAIN SECURITY FEATURES

Raise the security level of your Edge deployments

Edge Gateway Hardening

Device in-depth defense with no user/pass access, closed ports, no incoming communication channels, and secured outgoing channels.

Data Encryption

All user data stored in the device, whether running or shut down, or sent through any network is encrypted with compliant industry standards.

Unique Certificates

The authentication and authorisation of each of the participants in our communication system is secured by cryptographic certificates unique to each device.

Provisioning System

Secured first boot sequence where both the initial state of the device and its final communication certificates are configured.

OTHER SECURITY FEATURES

All the features. Zero trust.

Secure Boot

Our Edge Gateways only boot trusted firmware. Barbara performs a series of cryptographic algorithms at start-up to ensure the software has not been modified by third parties.

TPM Support

Our system can verify the signatures of the firmware against the certificates or encryption keys stored in the TPM (Trusted Platform Module).

System Integrity

Barbara monitors errors and unwanted events, allowing you to analyse and identify potential attacks and security-related events and to carry out preventive maintenance.

Role-Based Access Control (RBAC)

Device and data access is segmented in permissions and roles. This segmentation is key to prevent the risk of unwanted privilege escalation.

Compliance

Barbara has been implemented following the recommendations of organisations such as the GSMA, OWASP or the Industrial Internet Consortium (IIC) and industry standards such as IEC-62443.

Data Sovereignty

Barbara moves your data around without looking into it. Our platform does not step into the user plane, so you keep full ownership and privacy. Your data is yours. Full stop.

Get to know all the features of the Platform

Download
blog posts

Learn more about the importance of cybersecurity

Impact of Edge Computing on Industrial Cybersecurity

Edge computing, or the ability to store and process data on servers close to the source or destination of that data, is becoming increasingly fashionable. The IT world has been using it for years with regional data centers that serve content to our computers and cell phones more efficiently. What is new today is the beginning of its incursion into industrial environments.

Cybersecurity

IoT hyperconnectivity and obsolescence, the main cyber-attack risks for the industrial sector

These are the conclusions reached by Barbara IoT, which presents research on cybersecurity in this sector. Forty percent of industrial organizations have already experienced at least one security incident in the last year, with the industrial and energy sectors being the most vulnerable.

Cybersecurity

The key to IoT cybersecurity is in the devices

The IoT device is by far the most vulnerable element in the entire security chain. And the main reason is the lack of firmware updates.

Cybersecurity