Security Monitoring and Control - Business Model

This page contains the business model for the Security Monitoring and Control tool. This tool will offer IoT system operators with the possibility of controlling the security of their system with a minimal intervention and full integration with security-by-design (risk analysis) mechanisms used, following the DevOps approach

Alt text

Main Contributor

Partner: TECNALIA

Category: Research

Type: IoT Platform Provider, Smart IoT Systems provider, DevOps Solutions provider

Lean Canvas

Problem

Customer needs, requests and opportunities from the market

The lack of holistic security assurance for IoT systems, companies cannot guarantee high security and privacy levels. It is difficult to monitor IoT environments, and lack of automatic remediation in case of SLA violation. Compliance with GDPR requires systematisation of security and privacy assurance mechanisms and evidences be collected.

Existing Alternatives

Moste clients only use traffic monitoring tools. Limited control capabilities. Not integrated with design, no DevOps nor risk-driven security controls.

Solution

ENACT Result

ENACT Security Monitoring and Control Enabler

Exploitation Form

The Enabler prototype will be a software product and consultancy service for product customisation will be offered together. Technology transfer of open source parts. Licensing of closed parts (advanced features).

IPR Background 

MUSA Security Assurance Platform and MUSA Security Controls Metrics catalogue.

Description 

A security monitoring and control tool that offers IoT system operators the possibility of controlling the security of their system with a minimal intervention and full integration with security-by-design (risk analysis) mechanisms used, following the DevOps approach.The prototype includes heterogeneous monitoring and enforcement agents to capture and analyse security metrics to detect SLA violations, as well as assessing the security controls deployed in different layers.

Type

Dual License

Key Metrics

KPIs

Number and type of early adopters besides ENACT end-users. Number and types of tool functionalities used.

Time To Market / TRL at the end of the project

TRL5 in the project and TRL7 1 year after.

Unique Value proposition

Value added by the solution

Monitoring for controlling the security of the multi-cloud applications, considering heterogeneous information (container, application, network, etc.). This technique can continuously check compliance with the agreed security SLA, and implement several reaction mechanisms that take into consideration the severity of the detected security deviation, with the possibility of repelling or mitigating negative effects.

Unfair Advantage

Combines network and IoT platform level monitoring and control, and it is based on a comprehensive catalogue of formal metrics.

Customer Segments

Type

App Operators

Potential customers

The targeted customers are SMEs or large software companies planning to offer secure and GDPR compliant IoT systems, preferably those adopting the DevOps paradigm. The early adopters are the end-users of ENACT.

Segment

IoT systems in any domain. Full functionality will be exploited in SOFIA (SMOOL) based IoT systems.

Channels

Promotion

Tecnalia customer channels, Tecnalia marketing as well as internal and external exhibitions/industrial events.

Distribution

Tecnalia marketing and Tecnalia business development forces

Cost Structure

Cost of implementation 

Personnel costs to bringing prototype to the “market”.

Cost Sources

Hosting costs. Staff required: 1 senior developer (12 months) + 1 administrator.

Revenue Streams

Sources of financing foreseen after the end of the project

Depending on the result of Tecnalia Elevator pitch event.

Revenue Sources 

The Enabler will be provided with a 30-day free trial. The business model could be pay-per-use (each month or year) or per license, and will be part of the ENACT Framework license.