The use cases listed below allow you to concretely identify the security challenges faced by IoT devices and applications and to understand how they can be solved. The use cases are either actual implementations or readily available reference designs. On one hand, the use cases describe what the security challenge was and what benefits the security solution brings. On the other hand they explain how the security solution works. They additionally allow you to concretely identify how our preferred security partners can support you.
If the use case is of interest to you and can help you create or protect value for your own business, you can contact via the website the partner who elaborated the use case and investigate how this partner could support you in the design and implementation of the related security solution for you.
The partners will regularly update this list with new use cases.