Why Raspberry Pi is not good fo IoT
Introduction Raspberry Pi is probably the most known and used SBC. In 2019, zdnet said 30 millions Raspberry Pi were sold. Indeed, there are countless
As IoT market grows, insecurity of IoT devices is also rising. Hacker does not only use software attacks any more but also hardware attacks which could be a first step before a large scale software attack. While it is tempting to develop your own security solutions, the fact is developing such piece of software is a real challenge.
Sixty-eight percent of security practitioners say management believes IoT/OT innovations are critical to support business development and strategic activities.
Sixty percent of security practitioners say IoT/OT security is one of the least secured aspect of their digital infrastructures.
Thirty one percent of the IT security practitioners have slowed limited or stopped the adoption of IoT and OT project due to security concerns
Protection of personal data is a real challenge. In addition, cyber physical systems are now widely while an unsecure system can cause physical injuries.
IoT devices shall not be an entry point to your network for an attacker. Even if your network is not connected to internet an attacker may try to exploit weak wireless connection
Most IoT vendors do not have their own factory and device fabrication is often outsourced. In this case, protecting your intellectual property might be a real challenge.
TrustnPlay is a secure platform for MCU based on the open source Zephyr RTOS. It implements state of the art security features like secure boot, secure update, secure communications and secure local storage.
TrustnBoot is the TrustnGo’s secure bootloader, derived from well known industry-standard MCUBOOT. It provides enhanced security against both software and hardware attacks protecting your software IP and update process against remote and physical attackers.
Best in-class software
countermeasures against
remote & physical attackers
Customizable softwares to
fit your specific needs and
allow a flawlessly integration
One year support including
customer support and
software updates
Using a holey umbrella is a bad idea just like developing your own cryptographic protocol. Don’t let improvisation sabotage your work, use our secure software.
No homemade suspicious security feature developed by an intern.
Hiring a skilled team of cybersecurity experts is a way more expensive.
No need to learn cryptography or fight with barely understandable datasheets.
Work and improve your strengths, outsource the remainder.
Developing an innovative product is not an easy task and security is often the fifth wheel. In consequence either the security is not taken into account at all or third party open source secure library are used out of box (sometimes developers implement their own crypto algorithms!). These two approaches are equally risky.
Securing a product requires to follow a well defined but strict methodology which requires strong expertise in the security field to be correctly carried out. First, the security problem has to be defined then a secure architecture has to be designed and the proper pieces of software developed. Finally the actual resistance of the resulting device has to be assessed through not only software but also hardware penetration tests.
Threats, assets, attacker model, security requirements, we help you to define your security model.
Once Security Model has been designed, we help you to harden your secure softwares. We can also build everything from scratch.
Are you ready to market your device? Pentest it! Software, side-channel or fault injection attacks, let's build a personalized test plan together.
Overall system is only as secure as its weakest component. Don’t let improvisation sabotage your work.
Seven out of ten organizations say they have already experienced hacking attempts via the IoT.
Former hardware security evaluator and R&D manager at Serma Safety & Security’s Security Laboratory with 13 years of experience in security field, Michael Grand has founded TrustnGo to help companies in securing their embedded products.
Introduction Raspberry Pi is probably the most known and used SBC. In 2019, zdnet said 30 millions Raspberry Pi were sold. Indeed, there are countless
Introduction In a previous article, we discussed the countermeasures implemented in MCUBOOT and the validity of the previously performed security assessment. In this article, I’m
What is the European Cyber Resilience Act and what is it for? The standardization of practices within the European community is a major issue which
In a globalized world, your IP needs to be protected against theft and hackers as well as your customers’ data.