As IoT market grows, insecurity of IoT devices is also rising. Hacker does not only use software attacks any more but also hardware attacks which could be a first step before a large scale software attack. While it is tempting to develop your own security solutions, the fact is developing such piece of software is a real challenge.
Sixty-eight percent of security practitioners say management believes IoT/OT innovations are critical to support business development and strategic activities.
Sixty percent of security practitioners say IoT/OT security is one of the least secured aspect of their digital infrastructures.
Thirty one percent of the IT security practitioners have slowed limited or stopped the adoption of IoT and OT project due to security concerns
TrustnPlay is a secure platform for MCU based on the open source Zephyr RTOS. It implements state of the art security features like secure boot, secure update, secure communications and secure local storage.
TrustnBoot is the TrustnGo’s secure bootloader, derived from well known industry-standard MCUBOOT. It provides enhanced security against both software and hardware attacks protecting your software IP and update process against remote and physical attackers.
Using a holey umbrella is a bad idea just like developing your own cryptographic protocol. Don’t let improvisation sabotage your work, use our secure software.
Developing an innovative product is not an easy task and security is often the fifth wheel. In consequence either the security is not taken into account at all or third party open source secure library are used out of box (sometimes developers implement their own crypto algorithms!). These two approaches are equally risky.
Securing a product requires to follow a well defined but strict methodology which requires strong expertise in the security field to be correctly carried out. First, the security problem has to be defined then a secure architecture has to be designed and the proper pieces of software developed. Finally the actual resistance of the resulting device has to be assessed through not only software but also hardware penetration tests.
Overall system is only as secure as its weakest component. Don’t let improvisation sabotage your work.
Seven out of ten organizations say they have already experienced hacking attempts via the IoT.
Former hardware security evaluator and R&D manager at Serma Safety & Security’s Security Laboratory with 13 years of experience in security field, Michael Grand has founded TrustnGo to help companies in securing their embedded products.
In a globalized world, your IP needs to be protected against theft and hackers as well as your customers’ data.