As IoT market grows, insecurity of IoT devices is also rising. Hacker does not only use software attacks any more but also hardware attacks which could be a first step before a large scale software attack. While it is tempting to develop your own security solutions, the fact is developing such piece of software is a real challenge.
Protection of personal data is a real challenge. In addition, cyber physical systems are now widely while an unsecure system can cause physical injuries.
IoT devices shall not be an entry point to your network for an attacker. Even if your network is not connected to internet an attacker may try to exploit weak wireless connection
Most IoT vendors do not have their own factory and device fabrication is often outsourced. In this case, protecting your intellectual property might be a real challenge.
TrustnPlay is a secure platform for MCU based on the open source Zephyr RTOS. It implements state of the art security features like secure boot, secure update, secure communications and secure local storage.
TrustnPlay comes with the native support of the SE05x Secure Element from NXP.
Best in-class software
countermeasures against
remote & physical attackers
Customizable softwares to
fit your specific needs and
allow a flawlessly integration
One year support including
customer support and
software updates
Using a holey umbrella is a bad idea just like developing your own cryptographic protocol. Don’t let improvisation sabotage your work, use our secure software.
Keys remain on the server. Multi factor authentication and dual approval of signing operations.
Ready to use with MCUboot, RAUC or any PKCS11 enabled software. PKI infrastructure not required.
Simple business model. Unlimited number of users and signature.
PEM file are too unsecure to be usable ? Secure USB tokens are a pain to use ? Then use a secure, easy to use and flexible server to sign your OTA updates !
Developing an innovative product is not an easy task and security is often the fifth wheel. In consequence either the security is not taken into account at all or third party open source secure library are used out of box (sometimes developers implement their own crypto algorithms!). These two approaches are equally risky.
Securing a product requires to follow a well defined but strict methodology which requires strong expertise in the security field to be correctly carried out. First, the security problem has to be defined then a secure architecture has to be designed and the proper pieces of software developed. Finally the actual resistance of the resulting device has to be assessed through not only software but also hardware penetration tests.
Threats, assets, attacker model, security requirements, we help you to define your security model.
Once Security Model has been designed, we help you to harden your secure softwares. We can also build everything from scratch.
TrustnGo help you to certify your product according to the most known certification schemes (e.g. Common Criteria, CSPN, SESIP, PCI, ...).
Overall system is only as secure as its weakest component. Don’t let improvisation sabotage your work.
Seven out of ten organizations say they have already experienced hacking attempts via the IoT.
Former hardware security evaluator and R&D manager at Serma Safety & Security’s Security Laboratory with 13 years of experience in security field, Michael Grand has founded TrustnGo to help companies in securing their embedded products.
In a globalized world, your IP needs to be protected against theft and hackers as well as your customers’ data.