The dynamic ICT infrastructure behind IoT requires a system-level security solution to ensure secure end-to-end communication. After all, security vulnerabilities increase with rapid interface growth. In addition to preventing manipulation, a security system must prevent unauthorized access. Only clearly identified clients and devices may exchange data – be it in the cloud or in a private or corporate network. The solution must identify compromised devices immediately and take the appropriate countermeasures. Furthermore, network equipment manufacturers increasingly seek technologies that enable remote maintenance, device management and new business models, with feature authorization.