Trustio
Secure and Modular Industrial IoT Platform
While the number of connected devices is expected to tremendously grow within the next years, only very basic security features - if any - are deployed in most of the installations.
The result is an increasing number of attacks due to serious vulnerabilities: spoofing, tampering, repudiation, information disclosure, espionage, elevation of priviledge and denial of service (DoS) or service disruption are the result. Unsufficient protection of critical infrastructure is the number one risk within the industry.
We follow a distinctive secure by design approach combining highly secure hardware (secure boot, storage protection, communication protocols and others) with continuous and sustained device management and cloud computing.
Trustio solutions are designed to be reliable, scalable and secure like no other gateway available on the market.
From a management platform to ready-to-use devices to custom designed adaptations, Trustio offers a comprehensive and modular portfolio of state-of-the-art IIoT security at industrial grade.
Trustio Continuity
Trustio LTE
Trustio Ethernet
Trustio LPWAN
Trustio Cert
Trustio Continuity
Security & Device Management Platform
Reliable and scalable IoT solutions require an efficient way to manage devices remotely.
Trustio Continuity is the next generation device management system focusing on connectivity and security management, ready to operate several thousand devices in parallel.
Deliver devices and provision on-site and remotely without expert knowledge required.
• Zero-Touch deployment
• Network and secure connectivity
• Certificate management
• Security monitoring
• Remote Updates (Patch management)
• Connectivity/SIM/eSIM management
• Alarming and API to SIEM systems
• Compliance reporting
• Professional usability
• On-premis or cloud-based installation
Trustio LTE
The Secure Industrial IoT
LTE Gateway Platform
Gateways are the exposed cyber doors between the applicaton and the Internet and the interface to the physical world.
Within a holistic security concept, they form the root of trust together with other layers of security measures.
What looks like an easy task becomes a complex and ressource-binding challenge that classic hardware and device manufacturers can hardly master:
• Hardware security
• Software security
• Continuous security management (updates, fixes)
• Global cellular connectivity
• Wireless protocols (Bluetooth, ZigBee, WirelessHART)
• Industrial protocols
• Type approvals
The Trustio LTE platform is the perfect basis for your managed and secure mobile connectivity solution.
Combine proven building blocks for your made-to- measure industrial gateway solution:
• LTE global
• eSIM ready
• GNSS (GPS, Glonass, Beidou. Galileo)
• Wireless protocols IEEE 802.15.4
• Secure key storage (or TPM)
• Secure Boot
• Operating system
• Custom connector shields (RJ-45, M12)
• Industrial temperature range
• Ready-to-use mechanics
• Remote management via the
Trustio Continuity Platform
This unique features make it the ideal solution for a variety of industrial IoT applications.
• Industrial IoT/Sensor Network Gateway
• Retrofitting Substation Automation
• Asset tracking (Bluetooth Beacons)
• Passenger Information Systems
• Condition Monitoring
• ATM, POS
• CCTV
Customization
Security Features
Type Approvals
Technical Data
___________________________________________________________________________________________
Made-to-measure
Our proven platforms are based on extensive software and hardware knowledge, combined with the latest security expertise available on the market.
As all devices follow a fully modular approach, your individual OEM or ODM solution can be realized cost, time and ressource effective. Please get in contact to us to discuss your individual requirements.
___________________________________________________________________________________________
Industry-leading security focus
Like no other manufacturer SPECTRAAL focuses on security solutions for industrial and public IoT applications. Persuant to these objectives, all devices and software follow the latest cyber security insights and go further than the majority of competitors. We follow a distinctive security by design approach.
Secure key storage
• Storage encryption
• Hardware based root of Trust for Google Cloud IoT Core
• Zero Touch provisioning for AWS IoT and Google Cloud IoT Core
Remote Device State Attestation
• Verifiable configuration and device integrity
Secure Device ID
• Unclonable unique identification and authentication
• Product genuineness
Secure and Verified Boot
• Prevent persistent malicious modifications
(even when attackes would have physical access to the devices)
• Tamper prevention
Defense in depth
• Strict separation between use and control data
• Automated PKI and crypto key management
___________________________________________________________________________________________
Application Specific Requirements
Power & Distribution
• EMV and ESD according to IEC/EN 61850-3 Communication Networks
and systems in substations – Part 3: General requirements
Railway Applications
• EN 50155:2008 Railway applications - Electronic equipment used on rolling stock
• IEC 61373 Railway applications – Rolling stock equipment – Shock and vibration tests
• EN 50121-3-2 Railway applications – Electromagnetic compatibility
Signalling and Telecommunications Railway
• EN 50121-4 Emission and immunity of the signalling and telecommunications apparatus
Motor Vehicles and Agricultural and Forestry Applications
• Direktive 2009/64/EG, EMC Components of agricultural and forestry tractors
• Direktive 2009/19/EG, EMC of automotive components
• ECE Direktive Nr. 10, Revision 5, EMC of automotive components
• ISO 7637-2: Electrical transient conduction along supply lines only
• ISO 16750-2: Electrical loads
• ISO 16750-3: Mechanical loads
Industrial Automation
• Meets IEC 61131-2 und exceeds EMC and ESD requirements
• IEC61131-2: Spannungsausfall/einbruch/überbrückung Schärfegrad PS2 10 ms bei 19,2V
General EMV und ESD Compliance
• EN 61000-4-2 electrostatic discharge (ESD): 4 kV contact discharge, 8 kV air discharge
• EN 61000-4-3 electromagnetic field: 10 V/m (80-3000 MHz)
• EN 61000-4-4 fast transients (burst): 2 kV power line, 4 kV data line
• EN 61000-4-5 surge voltage: power line: 2 kV (line/earth), 1 kV (line/line), 1 kV data line
• EN 61000-4-6 conducted immunity: 10 V (150 kHz-80 MHz)
Please get in contact to us to discuss your application specific regulations and requirements in case they are not listed above.
___________________________________________________________________________________________
Interfaces
Mobile Connection
• Worldwide LTE and Fallback UMTS/HSPA+, GSM/GPRS/EDGE support
• 150Mbps downlink, 50 Mbps uplink
• Antenna diversity
• Connector 2 x SMA (2x2 MIMO or standard antennas)
• Dual SIM socket for flexible carrier selection (Micro SIM (3FF) ETSI TS 102 221 V9.0.0, mini UICC)
• eSIM-ready (with our partner carriers)
GNSS Receiver
• Concurrent reception of up to three in parallel: GPS, Galileo, GLONASS
• Supports all satellite augmentation systems
• Assisted GNSS (offline and online)
• Active and Passive Antenna
• Physical connector 1x SMA
Wireless Interface
• Multimode transceiver covering IEEE 802.15.4 protocols (Bluetooth, ZigBee, Wireless Hart)
Network Interface
• Ethernet 100 MBit/s (100BASE-TX), IEEE 802.3u
• Auto MDI/MDI-X
• Connector type: RJ-45 or M12 (D-coded)
Serial Bus Interfaces | MPI (Multi Purpose Interface)
• RS485
• Digital I/O
• Connector type: M12 5 pin B coded
• Connector type: Phoenix®
I/O Interface on Power Connector
• Connector type: M12 5 pin A coded
• Digital Input
• Relay
___________________________________________________________________________________________
Power
• 12 - 48 VDC
• PoE+
___________________________________________________________________________________________
Environmental Ratings
IP Protection Class
• IP54 with dual SIM
• IP67 available with eSIM
Temperature Range & Humidity
• Operating temperature range: -40°C to 70°C
• Humidity: 0-95% RH, non condesing
• Max. altitude (up to 5000m (16400ft) AMSL)
___________________________________________________________________________________________
Physical Dimensions
• Device height: 45mm
• Weight (w/o cabling & antennas): 450g
• Wall mounting and DIN rail mounting
___________________________________________________________________________________________
Physical Security
Our products offer unique industrial grade solutions to monitor device integrity and detect physical tampering and wireless protocol anomalies (e.g. spoofing and jamming). Security breaches disable devices, send alams and trigger key revocation procedures.
Please get in contact to us for detailed information.
Trustio Ethernet
Endpoint Security Node
for Connected Devices
For applications that are connected with wired network connections Trustio Ethernet is the platform of choice.
Add your defined endpoint of trust to manage security and end-to-end data encryption: scalable, easy to deploy and industrial grade.
Trustio Ethernet is the modular platform of your choice to add an additional layer of trust to remotely connected applications.
Add encryption, firewall functionality, tamper detection, combined with remote management and be ready for the next generation of IoT security.
This unique features make it the ideal solution for a variety of industrial IoT applications.
• Condition Monitoring
• Predictive Maintenances
• Retrofitting Control Systems
• ATM POS
• CCTV
• Digital Signage
Customization
Security Features
Type Approvals
Technical Data
___________________________________________________________________________________________
Made-to-measure
Our proven platforms are based on extensive software and hardware knowledge, combined with the latest security expertise available on the market.
As all devices follow a fully modular approach, your individual OEM or ODM solution can be realized cost, time and ressource effective. Please get in contact to us to discuss your individual requirements.
___________________________________________________________________________________________
Industry-leading security focus
Like no other manufacturer SPECTRAAL focuses on security solutions for industrial and public IoT applications. Persuant to these objectives, all devices and software follow the latest cyber security insights and go further than the majority of competitors. We follow a distinctive security by design approach.
Secure key storage
• Storage encryption
• Hardware based root of Trust for Google Cloud IoT Core
• Zero Touch provisioning for AWS IoT and Google Cloud IoT Core
Remote Device State Attestation
• Verifiable configuration and device integrity
Secure Device ID
• Unclonable unique identification and authentication
• Product genuineness
Secure and Verified Boot
• Prevent persistent malicious modifications
(even when attackers would have physical access to the devices)
• Tamper prevention
Defense in depth
• Strict separation between use and control data
• Automated PKI and Crypto Key management
___________________________________________________________________________________________
Application Specific Requirements
Power & Distribution
• EMV and ESD according to IEC/EN 61850-3 Communication Networks
and systems in substations – Part 3: General requirements
Railway Applications
• EN 50155:2008 Railway applications - Electronic equipment used on rolling stock
• IEC 61373 Railway applications – Rolling stock equipment – Shock and vibration tests
• EN 50121-3-2 Railway applications – Electromagnetic compatibility
Signalling and Telecommunications Railway
• EN 50121-4 Emission and immunity of the signalling and telecommunications apparatus
Motor Vehicles and Agricultural and Forestry Applications
• Direktive 2009/64/EG, EMC Components of agricultural and forestry tractors
• Direktive 2009/19/EG, EMC of automotive components
• ECE Direktive Nr. 10, Revision 5, EMC of automotive components
• ISO 7637-2: Electrical transient conduction along supply lines only
• ISO 16750-2: Electrical loads
• ISO 16750-3: Mechanical loads
Industrial Automation
• Meets IEC 61131-2 und exceeds EMC and ESD requirements
• IEC61131-2: Spannungsausfall/einbruch/überbrückung Schärfegrad PS2 10 ms bei 19,2V
General EMV und ESD Compliance
• EN 61000-4-2 electrostatic discharge (ESD): 4 kV contact discharge, 8 kV air discharge
• EN 61000-4-3 electromagnetic field: 10 V/m (80-3000 MHz)
• EN 61000-4-4 fast transients (burst): 2 kV power line, 4 kV data line
• EN 61000-4-5 surge voltage: power line: 2 kV (line/earth), 1 kV (line/line), 1 kV data line
• EN 61000-4-6 conducted immunity: 10 V (150 kHz-80 MHz)
Please get in contact to us to discuss your application specific regulations and requirements in case they are not listed above.
___________________________________________________________________________________________
Interfaces
Network Interface
• 2xEthernet 100 MBit/s (100BASE-TX), IEEE 802.3u
• Auto MDI/MDI-X
• Connector type: RJ-45 or M12 (D-coded)
Serial Bus Interfaces | MPI (Multi Purpose Interface)
• RS485
• Digital I/O
• Connector type: M12 5 pin B coded
• Connector type: Phoenix®
I/O Interface on Power Connector
• Connector type: M12 5 pin A coded
• Digital Input
• Relay
___________________________________________________________________________________________
Power
• 12 - 48 VDC
• PoE+
___________________________________________________________________________________________
Environmental Ratings
IP Protection Class
• IP67 available with M12
Temperature Range & Humidity
• Operating temperature range: -40°C to 70°C
• Humidity: 0-95% RH, non condesing
___________________________________________________________________________________________
Physical Dimensions
• Device height: 45mm
• Weight (w/o cabling & antennas): 400g
• Wall mounting and DIN rail mounting
___________________________________________________________________________________________
Physical Security
Our products offer unique industrial grade solutions to monitor device integrity and detect physical tampering and wireless protocol anomalies (E.g. spoofing and jamming). Security breaches disable devices, send alarms and trigger key revocation procedures.
Please get in contact to us for detailed information.
Trustio LPWAN
The Secure Endpoint for your
Low-Power Wide-Area Network Application
We offer the next generation platform for low-power IoT solutions, featuring latest security beyond wireless protocol standards.
Trustio LPWAN is the secure platform for your LPWAN application with hardware trust anchor, secure boot, zero touch deployment and advanced device management.
Combine NB-IoT, Cat M1, LoRa or SIGFOX with wireless or wired field-bus interfaces to get applications deliver data securely into the cloud system of your choice.
This unique features make it the ideal solution for a variety of industrial IoT applications:
• Sensor Network Gateway
• Condition Monitoring
• Passenger Information Systems
• Asset tracking (Bluetooth Beacons)
Customization
Security Features
Type Approvals
Technical Data
___________________________________________________________________________________________
Made-to-measure
Our proven platforms are based on extensive software and hardware knowledge, combined with the latest security expertise available on the market.
As all devices follow a fully modular approach, your individual OEM or ODM solution can be realized cost, time and ressource effective. Please get in contact to us to discuss your individual requirements.
___________________________________________________________________________________________
Industry-leading security focus
Like no other manufacturer SPECTRAAL focuses on security solutions for industrial and public IoT applications. Persuant to these objectives, all devices and software follow the latest cyber security insights and go further than the majority of competitors. We follow a distinctive security by design approach.
Secure key storage
• Storage encryption
• Hardware based root of Trust for Google Cloud IoT Core
• Zero Touch provisioning for AWS IoT and Google Cloud IoT Core
Remote Device State Attestation
• Verifiable configuration and device integrity
Secure Device ID
• Unclonable unique identification and authentication
• Product genuineness
Secure and Verified Boot
• Prevent persistent malicious modifications
(even when attackes would have physical access to the devices)
• Tamper prevention
Defense in depth
• Strict separation between use and control data
• Automated PKI and crypto key management
___________________________________________________________________________________________
Application Specific Requirements
Power & Distribution
• EMV and ESD according to IEC/EN 61850-3 Communication Networks
and systems in substations – Part 3: General requirements
Railway Applications
• EN 50155:2008 Railway applications - Electronic equipment used on rolling stock
• IEC 61373 Railway applications – Rolling stock equipment – Shock and vibration tests
• EN 50121-3-2 Railway applications – Electromagnetic compatibility
Signalling and Telecommunications Railway
• EN 50121-4 Emission and immunity of the signalling and telecommunications apparatus
Motor Vehicles and Agricultural and Forestry Applications
• Direktive 2009/64/EG, EMC Components of agricultural and forestry tractors
• Direktive 2009/19/EG, EMC of automotive components
• ECE Direktive Nr. 10, Revision 5, EMC of automotive components
• ISO 7637-2: Electrical transient conduction along supply lines only
• ISO 16750-2: Electrical loads
• ISO 16750-3: Mechanical loads
Industrial Automation
• Meets IEC 61131-2 und exceeds EMC and ESD requirements
• IEC61131-2: Spannungsausfall/einbruch/überbrückung Schärfegrad PS2 10 ms bei 19,2V
General EMV und ESD Compliance
• EN 61000-4-2 electrostatic discharge (ESD): 4 kV contact discharge, 8 kV air discharge
• EN 61000-4-3 electromagnetic field: 10 V/m (80-3000 MHz)
• EN 61000-4-4 fast transients (burst): 2 kV power line, 4 kV data line
• EN 61000-4-5 surge voltage: power line: 2 kV (line/earth), 1 kV (line/line), 1 kV data line
• EN 61000-4-6 conducted immunity: 10 V (150 kHz-80 MHz)
Please get in contact to us to discuss your application specific regulations and requirements in case they are not listed above.
___________________________________________________________________________________________
Interfaces
Mobile Connection
• NB-IoT (optional Cat M1, LoRa or SIGFOX)
• Connector 1 x SMA
• SIM socket for flexible carrier selection (Micro SIM (3FF) ETSI TS 102 221 V9.0.0, mini UICC)
• eSIM-ready (with our partner carriers)
Wireless Interface
• Multimode transceiver covering IEEE 802.15.4 protocols (Bluetooth, ZigBee, Wireless Hart)
Serial Bus Interfaces | MPI (Multi Purpose Interface)
• RS485
• Digital I/O
• Connector type: M8
• Connector type: Phoenix®
I/O Interface on Power Connector
• Connector type: M12 5 pin A coded
• Digital Input
• Relay
___________________________________________________________________________________________
Power
• 6 - 48 VDC
___________________________________________________________________________________________
Environmental Ratings
IP Protection Class
• IP67 available with M-connectors
Temperature Range & Humidity
• Operating temperature range: -40°C to 70°C
• Humidity: 0-95% RH, non condesing
• Max. altitude (up to 5000m (16400ft) AMSL)
___________________________________________________________________________________________
Physical Dimensions
• Device height: 45mm
• Weight (w/o cabling & antennas): 220g
• Wall mounting
_________________________________________________________________________________________
Physical Security
Our products offer unique industrial grade solutions to monitor device integrity and detect physical tampering and wireless protocol anomalies (e.g. spoofing and jamming). Security breaches disable devices, send alams and trigger key revocation procedures.
Please get in contact to us for detailed information.
Trustio Cert
Secure Key and Certificate Management
Suite for Production
Device security has to start in production.
Crypto Authentication with hardware-based cryptographic key storage and firmware attestation (secure boot) are appropriate means to protect your embedded devices.
Trustio Cert allows on-site and on-demand key and certificate management and flexible integration into your mass production and production systems.
• Key insertion during manufacturing
• Certificate Management
• Secure device identification & Secure Boot
• No expert knowledge required
• No external sources of trust required
• Custom integration into existing production systems
• Audit trails
• High availability
Trustio Cert Building Blocks
• Solution consulting
• Hardware design consulting and
component selection
• Software Source Code for device communication
• Trustio Cert Appliance
• Software integration into your production system
• Continuous updates and maintenance
SOLUTIONS
© SPECTRAAL 2019