Atsign Technology for IoT Security & Simplicity

No Network Attack Surface
No Static IPs or Open Ports
No Firewalls
No Passwords
No Costly Security Budget

With Atsign Technology, every device is addressable through an atSign™, enabling end-to-end encrypted device communication.

Atsign Technology: Overview

IoT Security


As IoT (Internet of Things) devices become directly connected to the Internet via cellular, LoRaWAN, Wi-SUN, HaLOW, satellite, or Wi-Fi, better security, especially for the data they generate, becomes critically important. IoT security thinkers, including NIST IoT are working hard to solve this, but we believe that it requires a very different approach:

Instead of managing and protecting attack surfaces, we eliminate them.

Leading or contributing to IoT/OT? See how Atsign tackles key security challenges.

  • Cryptographic keys are cut on the edge by the device
  • A major attack surface is eliminated by removing the need for open ports on external interfaces
  • Data is end-to-end encrypted, even when at rest
  • Device owners can control which subset of data is sent to whom
Collage of IoT items with atsigns overlayed
Chart showing IoT device, micro service, and app

IoT Simplicity

Atsign technology provides radical simplification for OT and IoT. We strip things down to the protocol level, creating both zero trust and zero configuration environments – completely without passwords – eliminating all attack surfaces created by over-complexity, and simplifying the administration of devices in the process.

Eliminates the need for physical security devices

  • No firewalls required
  • No VPNs required
  • No open ports, including 22
  • Provides data routing hardware lockdown of encryption keys

Makes devices easier to add and administer

  • Fewer components required
  • No complex administrative tools needed

Allows for dynamic IP addresses

  • No longer need to assign static IPs
  • Greatly simplifies network administration

Tools & Demos

IoT No Attack Surfaces:  SSH No Ports Demo

  • Create an SSH session on remote devices WITHOUT
    • Configuring static IP addresses 
    • Installing complex VPNs
    • Configuring complex firewalls
    • Requiring TCP/IP ports open on device
  • Zero attack surface
  • Cryptographic authentication
  • End-to-end encryption with RSA 4096 SSH session keys

Watch the demo!

Open-Source IoT with Dart and Flutter: The KRYZ Security Solution

The Problem: Radio station KRYZ was hacked by someone who started playing their own music. 

The Solution: A Flutter application using the Atsign SDK that provides both security and real-time monitoring for the station. 

We encourage you to take a look at the full walkthrough to see this groundbreaking tech for yourself. Better yet, request a demo from the man himself, here:


Watch the demo!


How can Atsign help your organization?

Set up a call with someone from our team.

Pick a time from our calendar