LoopEdge addresses security challenges in Industrial Internet of Things (IIoT) environments, as described in the following sections:

Security Challenges

In today's world of connected things, manufacturing enterprises face on-going security threats that can impact critical operations, resulting in costly downtime. With the trend of IoT data processing and analysis moving to the edge of the network, the need for endpoint and data transport protection has greater importance for devices that may be vulnerable to cyber attacks.

Above all, security should be treated as a process, not as a one-time task to check off a list. To that end, Litmus Automation continually assesses security recommendations and takes the necessary measures to keep the software in compliance with current standards.

Security Built into LoopEdge Architecture

Since its inception, LoopEdge software has incorporated strict security standards.

The LoopEdge framework addresses security in the following categories:

Access Security

LoopEdge handles device access and threat detection in the following ways.


Remote Access via LoopCloud

LoopEdge works seamlessly with the LoopCloud platform for cloud-level processing and device management. Access LoopEdge devices from anywhere via the LoopCloud platform Remote Access feature, allowing flexible and secure access to your LoopEdge Devices for troubleshooting and configuration. See Remote Access to LoopEdge.

Data Transport Security

Data transmission occurs over an encrypted pipe, which uses SSL and TLS.

Over-the-Air Updates

All software updates, including the image files (.ova and .upd) updates, are digitally signed and encrypted. Data integrity and signature validity are verified before any upgrade.

Over-the-air (OTA) device firmware updates can be configured in LoopCloud using the following firmware features: