STERNUM RIEMS

Real-time IoT Event Monitoring System

Visualize & manage IoT security from within. RIEMS provides first-of-its-kind visibility into the device, even if the device is not connected to a managed network, enhanced with the unique ability to be alerted immediately of any attack attempts on any of your IoT devices.

 
 
 
sternum_peephole.png

IoT security is not complete without visibility and monitoring.

 
 
 

Maintaining real-time visibility into the dynamic and distributed IoT environment is a mission of high complexity. This challenge is enhanced by the limited computation and network resources of most IoT devices, and by the common lack of a managed network that connects all devices.

The growing need for visibility, third-party code management, update management, and security monitoring – can now be answered by Sternum RIEMS. With low overhead and minimal code footprint, Sternum RIEMS creates intimate visibility into the entire device. Following a quick integration, advanced device analytics are accessible through the RIEMS dashboard or through your existing SIEM. RIEMS provides first-of-its-kind visibility into the device, even if the device is not connected to a managed network, enhanced with the unique ability to be alerted immediately of any attack attempts on any of your IoT devices.

KEY FEATURES

IoT monitoring and management

Monitor and manage your unmanaged devices

RIEMS integrates with the device itself using our embedded technology, thus achieving first-of-its-kind visibility and monitoring to distributed and unmanaged devices. Network events, cryptographic events and OS related events are just a few examples from the wide variety of data accessible via RIEMS.

IoT analytics integration

Immediate response, advanced IoT analytics.

The algorithmic engine behind RIEMS was crafted with unique domain expertise in IoT-based cyber-attacks. Immediate response to cyber-breaches is possible and can also be integrated directly into existing SIEM and security systems.

 
Third-party code visibility and management

Third-party code visibility and management.

After mapping all third-party components in use, RIEMS will auto-scan and alert when a new critical CVE is discovered in one of them, and when version updates are required, making it rather easy to keep your device up-to-date and create a CBOM.

IoT device seamless integration

Seamless integration, negligible overhead.

Low footprint and small overhead are achieved by using only the existing connectivity of the device and by allowing configurable policies. This seamless integration and lightweight approach allow RIEMS to preserve the full functionality of the device and be applicable for low-resources devices.