IoT Solutions

Today, billions of devices are connecting to networks all over the world that require unique security.

IoT Universe


In today’s connected world, mutual-authentication of devices and networks is critical to maintaining a secure and healthy ecosystem. Whether you’re a device manufacturer, service provider or standards body, privacy and security of your devices, networks and standards must be protected. Without proper security, you are exposing your customers and your organization to rogue, infected and/or malicious devices.

Comodo CA provides trusted, mutual-authentication solutions for all IoT devices and networks. Using x.509 PKI certificates and custom hybrid TLS/SSL certificates, our high-availability, batch-issuance system allows for administrators to easily enroll, download and decrypt certificate batches quickly and efficiently and feature:

Comodo CA Ecosystem Set-Up

  • Creation of Certificate Profile(s)
  • ​Drafting of Certificate Policy
  • Drafting of Certificate Practices Statement
  • HSM Provisioning and Management

CA Signing and Hosting Service

  • Root CA Signing
  • Subordinate CA Signing
  • Securely hosted and stored in a tier 5 datacenter using Hardware Security Module (HSM) technology

IoT PKI – Batch Issuance Service

  • Private ecosystems
  • Comodo IoT CA service
  • High-Availability service
  • ECC & RSA support
  • Cloud based admin portal
IoT process flow chart

Hardware Security Modules

True Hardware-Based Key Management for Next-Generation PKI Applications

A dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle. Hardware security modules act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys inside a hardened, tamper-resistant device.

Enterprises buy hardware security modules to protect transactions, identities, and applications because HSMs excel at securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services for a wide range of applications.

  • Comodo CA is an authorized reseller
  • Get access to top of the line HSMs
  • Compatible with Comodo CA’s Code Signing On Demand
SafeNet Logo
Device Authority Logo
Keyscaler Platform Graphic

KeyScaler™ IoT Security Platform

A device authentication engine with policy-driven data security manager and agents to provide a single, comprehensive software security offering for IoT applications. 

KeyScaler™ delivers an on-device agent component as well as a Server system that get integrated for end customers to provide software defined device provisioning along with automated policy-driven trust, privacy and security management.

KeyScaler™: Automating Certificate Delivery

Security Automation at IoT scale
Owner Controlled security
Device Provisioning
Credential Management 
Policy-driven Encryption
Automation Password Management
Keyscaler Automation Graphic

Global Industry Memberships

Comodo is a member of multiple industry organizations to help educate, promote, consult, recommend, influence and support global Cyber security projects for all networks and Ecosystems worldwide.
Open Connectivity Foundation Logo
Zigbee Dot Dot Logo
WiMax AeroMACS Logo

Contact Us