ARTICLE
Atsign Zero Trust
100% Connected & Protected IoT
Atsign IoT Security
Tired of adding security to your network by deploying VPNs, configuring firewalls, assigning static IPs, and opening Port 22 for the millionth time? The Internet can be a wonderful yet precarious place. Just ask an IoT device, and you would know all about it.
In the early 2000s, our co-founder, Colin Constable, was a founding member of the Jericho Forum, a group with worldwide membership designed to promote the idea of “de-perimeterization.” Today, many companies are adopting a “Zero Trust” model of network security, which operates under the premise that no device should be trusted by default, even if previously authenticated and verified; all connections should be mutually authenticated and verified. Atsign has been working under this Zero Trust model from our beginning.
We are confident that developing on the atPlatform offers a simpler and more secure way to build IoT applications in a Zero Trust environment. And we really mean Zero Trust. No data in the clear to your VPN provider. No leaked email addresses or phone numbers from your “end-to-end encrypted” messaging service. No centralized key management as keys are cut and stored on the edge, and no application backends to manage either. The atPlatform is 100% end-to-end encrypted, and our technology secures both the network and the data, so it is never in the clear for others to see. Plus, we are open source.

Our goal is to make the Internet a safer place. We are doing this by making all people, entities, and things addressable on the Internet with unique identifiers called atSigns. With atSigns, there are no passwords or complex authorization, and all connections are end-to-end encrypted. All communications between IoT devices originate outbound, eliminating the need for firewalls and complex network configuration. Data is end-to-end encrypted, eliminating the need for VPNs. With the atPlatform technology, you can ssh into a remote device without opening any ports.
Developer Environment
Concerned about meeting the requirements for CCPA, GDPR, and other privacy regulations? With true end-end-encryption, data privacy compliance is built right in, so you can focus on what you do best, developing great IoT applications! Additionally, the atPlatform has SDKs that support a broad range of environments, making cross-platform deployment a breeze.
Get Involved
Take a look at our architecture, and email us at iot@atsign.com to schedule a demo of our open-source technology.
If you’re eager to get started, check out our repo here: https://docs.atsign.com/
As always, follow our socials to stay informed on all things Atsign IoT.
https://twitter.com/atsigncompany
https://www.youtube.com/c/AtsignCo
Networking 2.0 vs. APIs
Networking 2.0 technology is better than current APIs because it keeps your data private. With current APIs, anyone can see your data when it is being sent between applications. Networking 2.0 technology encrypts your data so that only the intended recipient can see it.
Secure RDP Using SSH No Ports
Secure RDP using SSH No ports and Networking 2.0 technology. Quickly access your remote desktop without any open listening ports.
Secure Your Radio Station with Networking 2.0
KRYZ Radio Station in Mariposa, CA recently turned to Atsign’s Networking 2.0 technology to secure their broadcast.
Top 4 Difficulties of Managing Gateways at Scale and How Networking 2.0 Can Make them Disappear
With the expansion of IoT devices connected to the Internet, it is difficult to manage gateways at scale. Networking 2.0 technology relieves these difficulties, and eliminates network attack surfaces.
Close Port 22 Forever
Close Port 22 forever with SSH No Ports. Try out Networking 2.0 for yourself with hassle-free remote access to your devices from anywhere, all without having to know fixed IP addresses, and with no listening ports open.