SHARE
Facebook X Pinterest WhatsApp

Thirdwayv Launches AppAuth IoT Security Platform

thumbnail
Thirdwayv Launches AppAuth IoT Security Platform

Smartphone for mission-critical IoT security

Users can control and manage mission-critical industrial, medical and infrastructure devices via smartphone and Bluetooth.

Written By
thumbnail
Sue Walsh
Sue Walsh
Jun 30, 2019

IoT security and end-to-end connectivity vendor Thirdwayv has launched AppAuth software, designed to protect mission-critical IoT applications. The product’s three software modules protect IoT devices, smartphone apps, and cloud services from malware attacks and validate system commands/ components.

AppAuth allows users to safely control and manage their mission-critical IoT devices in industrial, medical and infrastructure settings with their own smartphones and a Bluetooth connection. The software assigns each component of the IoT system a digital cryptographic identity and protects communication links and the surrounding environment. Each element of the system validates user authority and privileges.

“Mission-critical IoT systems are typically related to the safety of individuals or the protection of high-value property,” says Vinay Gokhale, Thirdwayv’s VP of Business Development. “AppAuth enables our enterprise and commercial customers to bring trust to these systems through reliable user and device authentication, identity management, and attestation of one system component to the other.”

The smartphone app uses the hardware root of trust to continually monitor the phone’s operating system, authenticity, and integrity in real time. This approach protects the app from both malware attacks and OS vulnerabilities. AppAuth’s cloud infrastructure provides over-the-air certificate issuance once verification is complete. Its cloud module allows for lifecycle management of all IoT components on the network.

Growing Worry About Smartphone Vulnerabilities

Safety and mission-critical IoT applications have become even greater targets for cybersecurity attacks. Smartphone vulnerability is a growing concern.

“IoT systems are especially at risk of attack through connectivity to their cloud services, smartphone apps, and other IoT devices,” says Steve Hoffenberg, Director of VDC Research. “IoT device makers need to ensure that only currently trusted entities can communicate with their products by enforcing authentication and access privileges in all levels of communications.”

AppAuth is available for both iOS and Android and via software development kits (SDKs) and application programming interfaces (APIs). The product works out of the box with the company’s SecureConnectivity platform, which connects and protects wireless IoT deployments.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

New Frontiers of IAM: Reaching Great Heights with 2024 Trends
Ronak D. Jain
May 22, 2024
Application Security for IoT: 10 Best Practices
Sagar Nangare
Feb 21, 2023
The Importance of Ensuring IoT System Security
Is Nanotechnology Ready to Enter the IoT Security War?
Bernard Brode
Apr 12, 2022

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.