Our patented universal IoT security platform that works with any root-of-trust for easy-to-use, scalable end-to-end security.
What is QuarkLink™?
QuarkLink is our software-based IoT security platform that securely connects IoT devices to server-hosted apps on-premises or in the cloud. QuarkLink uses advanced cryptography techniques to integrate with any root-of-trust for end-to-end security across every IoT device.
QuarkLink effectively secures your IoT system, and combined with QDID, it offers the highest standard of security available.
The universal IoT security platform
Unlike other IoT security platforms whose vulnerabilities make scaling a risk, QuarkLink provides the following advantages:
Covers all device deployment stages
Users can provision, onboard and monitor devices from a single software platform. That’s a rarity in the IoT security market.
Easy root-of-trust integration
It takes other IoT software platforms substantial effort to integrate with a given root-of-trust. QuarkLink integrates easily with any root-of-trust and connects thousands of devices to servers in minutes.
OEMs, system integrators and even end-users can easily manage their IoT estate without any specialist expertise.
Scalable end-to-end security is now a reality
QuarkLink integrates with your hardware root-of-trust to make provisioning, onboarding and security management of IoT devices fast and easy.
Inject firmware securely, enable secure boot processes, and generate device identities and cryptographic keys in a complete system.
Generate and distribute certificates and create secure TLS connections between devices and IoT hubs. Onboard thousands of devices in minutes.
From handling secure updates to controlling the whole key and certificate lifecycle, manage IoT device security effortlessly.
Provisioning IoT devices
QuarkLink injects firmware into IoT devices, bypassing the security risks of third parties and HSMs (hardware security modules).
At the programming stage, semiconductors are injected with a firmware image. QuarkLink encrypts and signs this firmware so that only the IoT device can decrypt it. Secure boot sequences can be enabled to work inside the IoT device.
Devices that don’t have an established identity can generate their own using QuarkLink and a root-of-trust. Neither cryptographic keys nor identities leave the device for ultimate security.
This leads to substantial cost reductions for delivering IoT devices as QuarkLink avoids secure provisioning expenses from HSMs and secure key distribution.
Onboarding IoT devices
Once devices are configured and identified, QuarkLink authenticates them and provides certificates and credentials for secure onboarding.
QuarkLink defines device batches within an IoT system, assigns each batch a server policy, and links it with a chosen cloud account and its privileges. Each device’s identity is imported to QuarkLink, which enables mutual authentication between QuarkLink and the device.
With IoT devices connected to your server, QuarkLink can manage their security status. You can onboard thousands of devices to multiple servers in minutes with just one click.
QuarkLink connects to all major IoT hubs, including AWS, Azure, Mosquito and others, and is equally able to work with private clouds or other services.
Managing IoT devices
System owners manage their IoT devices with QuarkLink’s simple interface.
QuarkLink makes it possible to assess risks and carry out security procedures across IoT devices – no cryptographic expertise necessary.
System owners manage the whole key lifecycle, from renewal to revocation. Firmware signing and encryption is managed with over the air (OTA) updates.
QuarkLink can monitor a device’s firmware integrity to detect compromises or cyberattacks. In such a case, it can unlink a device from its system, disconnect it from servers and revoke its keys. And if a device changes ownership, it can be re-onboarded easily.
Easy for the end-user
You don’t need to be a cryptography expert to use QuarkLink. Control and monitor your IoT security from an intuitive user interface of simple menus and action buttons.
Private key lifecycle
Generate, renew and revoke certificates entirely within QuarkLink. Keys also never leave the device and you don’t need HSMs or third parties for injection or other handling. QuarkLink is a comprehensive IoT security system.
QuarkLink integrates with any root-of-trust as a security management layer. Once set up, onboarding and key management is fast and easy for system owners to use.
Zero-touch, zero fuss
Automated processes mean no manual intervention or complex security workarounds. Managing devices through an intuitive interface makes it easy for users to handle security themselves.
See QuarkLink in action
Discover how our universal IoT security platform could transform your IoT ecosystem.
QuarkLink integrates with any root-of-trust, both hardware and software, so that many kinds of IoT devices can receive end-to-end security.
Semiconductor manufacturers such as Renesas use QuarkLink to provide their customers more control over their device security. Talk to one of our security experts for how we can help you.
The opportunity of advanced IoT security
When combined with a hardware root-of-trust, QuarkLink eliminates the need for third party key injection. QuarkLink is its own enclosed system that enables on-demand key and certificate management for IoT devices.
Self-contained key generation (provided by a hardware root-of-trust) and IoT device management open up new opportunities for IoT devices to scale and innovate. What’s more, everyone in the IoT device value chain, from chip to cloud, gets peace of mind from easy end-to-end security.
QuarkLink is part of Q:Architecture™
Great IoT security is using QuarkLink with your given hardware root-of-trust.
But the best IoT security uses QuarkLink with QDID™ to secure devices at the highest standard.
QuarkLink is the software complement to its sister hardware, QDID. Both solutions together form Q:Architecture, the fully integrated chip-to-cloud security architecture for your IoT devices.