Security

Make your device safe

Security and security updates are on high demand nowadays. Newer standards force the manufacturers to fix security leaks and to provide safe and reliable update.

We offer both spectrum of consulting services. A device must be hardened to avoid to be controlled by an attacker, and several scenarios can be analyzed and countermeasures implemented, according to the requirement of your project. We have experience with CVE monitoring and SBOM, and a device can be checked during its life and find solutions for security leaks. Development of a hardened Linux Device is part of our offer. We have experience with Secure Boot for many SOCs on the market, and we help to write penetration tests to verify the security of your device.

After a security leak is discovered, the device in field must be updated. We provide safe and reliable update management. An update package is cryptographic verified by the device and it is ensured that a software from a not authenticated source won’t be accepted by the device.

Together with Secure Boot, and using encryption for sensible data (like patients’ data for medical device), an authenticated update will enable your device to be conform with the current security standard (IEC-62443 for example).

Our activities on security

Secure Boot

How to make sure that your device is not running any not authenticated code ? With Secure Boot. We have experience by implementing Secure Boot according to the specification of SOC vendor

Monitor

CVE Monitor for security leak and analyze if a leak will affect your products

Safe and Reliable Update

Security leaks must be fixed, and this requires your device must be updated. A non secure update is even worse that the security leak. We provide industrial proof updater and we integrate it into your product

Crypto Development

Some SOCs have cryptographic processors, and they can be used if a suitable driver is available in the kernel. We have experience to write crypto drivers and pushing them to kernel mainline.

Security is complex and it is an iterative process. Not all solutions can be applied to any project. The choice of the right technology is fundamental for the success.

Please get in touch with us and discuss together about the security for your device.