As IoT market grows, insecurity of IoT devices is also rising. Hacker does not only use software attacks any more but also hardware attacks which could be a first step before a large scale software attack. While it is tempting to develop your own security solutions, the fact is developing such piece of software is a real challenge.
TrustnPlay is a secure platform for MCU based on the open source Zephyr RTOS. It implements state of the art security features like secure boot, secure update, secure communications and secure local storage.
Using a holey umbrella is a bad idea just like developing your own cryptographic protocol. Don’t let improvisation sabotage your work, use our secure software.
PEM file are too unsecure to be usable ? Secure USB tokens are a pain to use ? Then use a secure, easy to use and flexible server to sign your OTA updates !
Developing an innovative product is not an easy task and security is often the fifth wheel. In consequence either the security is not taken into account at all or third party open source secure library are used out of box (sometimes developers implement their own crypto algorithms!). These two approaches are equally risky.
Securing a product requires to follow a well defined but strict methodology which requires strong expertise in the security field to be correctly carried out. First, the security problem has to be defined then a secure architecture has to be designed and the proper pieces of software developed. Finally the actual resistance of the resulting device has to be assessed through not only software but also hardware penetration tests.
Overall system is only as secure as its weakest component. Don’t let improvisation sabotage your work.
Seven out of ten organizations say they have already experienced hacking attempts via the IoT.
Former hardware security evaluator and R&D manager at Serma Safety & Security’s Security Laboratory with 13 years of experience in security field, Michael Grand has founded TrustnGo to help companies in securing their embedded products.
In a globalized world, your IP needs to be protected against theft and hackers as well as your customers’ data.