• Identity & Access Management

    Integrate physical and logical security requirements

27.02.2025 09:29

Maximum security for IoT devices - the easy way with the Peak Security Suite

Automated certificate management and secure registration without predefined secrets

Managing and securing IoT devices poses major challenges for many companies: How can devices be securely integrated into existing infrastructures without complex key management or insecure default passwords? Peak Security Suite offers a powerful solution with Zero Knowledge Initial Enrollment (ZKIE) - an innovative process that revolutionizes the secure enrolment and management of IoT devices.


[In der Blog-Übersicht wird hier ein Weiterlesen-Link angezeigt]


IoT security without compromise - how ZKIE works

Peak Security Suite makes enrolling new IoT devices easier than ever before. The highlight: no predefined keys or secrets are required, which significantly reduces both the management effort and the security risk. The process is fully automated and highly secure:


  1. NFC based login: Using a special smartphone app, the user connects to an IoT device/bridge via NFC
    (= Near Field Communication). The device generates a private key and creates a CSR (= Certificate
    Signing Request). The CSR is sent to a Peak Security Suite service via the app.

  2. Secure certificate issuance: In a Peak Security Suite workflow process, the CSR is processed and sent to an
    internal CA (= Certification Authority). You can find more information about process-controlled Certificate
    Lifecycle Management with the Peak Security Suite here. After the automated check, a certificate is issued.

  3. Automatic activation: the issued certificate and the matching firmware are transferred back to the IoT
    device/bridge via the smartphone app using NFC. After saving, the IoT device/bridge restarts. It is now
    securely registered in the user's IoT infrastructure.


Once registered in the Peak Security Suite, IoT devices can be easily managed and configured via the web-based GUI of the Peak Security Suite. In this way, the IoT devices can also be equipped with new, secure hardware-based keys or firmware updates at any time - without having to replace a single hardware component.


Complete control over the IoT life cycle

From initial registration to updates and decommissioning - the Peak Security Suite enables fully process-controlled management of the entire IoT lifecycle. Thanks to the flexible workflow engine, individual security policies and company requirements can be easily mapped.


Why Peak Security Suite?

✔ No manual key management - automatic, secure registration with zero-knowledge procedure

✔ Maximum security - no pre-set passwords or insecure default keys

✔ Automated certificate management - full control over the entire certificate lifecycle

✔ Future-proof - firmware updates and key management without hardware replacement

✔ Flexible integration - connection to existing IT security infrastructures


Find out more now!

Together with our partners WIZnet and Våghals, we presented an intelligent, IoT-based shelving system  embedded world 2025, that can be used to digitally track and manage stock inventories. Curious how it works? Watch this short Linkedin video:


Do you want to take the security of your IoT infrastructure to the next level? Peak Security Suite is your solution for future-proof, highly automated IoT device management. Contact us for a no-obligation consultation or live demo!

Connected solutions

You can click on the links to get more information about the individual components