Embedded security by design.

Security is a process

We help creators of intelligent connected devices to design, implement and operate their systems with a sustainable security level.

It should be a habit to consider security aspects when dealing with any man-made system. We promote an approach that does this since the system's conception and on to its design, implementation and deployment, up to its decommission.

Learn more about our “Security Pattern”

Why choose our
“Security Pattern”?

Each member of our technical team gained a pluriannual experience in the domains of security and crypto for microcontrollers, smartcards, automotive, wireless connectivity, ASIC and FPGA.

We are active participants in the cryptographic research community and we are part of standardization bodies such as Bluetooth, IEEE and various other consortia.

Guido is co-author of the NIST SHA-3 algorithm.

Check our experience

We bring strong
Security to your
IoT system

As devices become increasingly connected, we need to design-in enough protection to secure them against emerging threats.

This is why we developed a comprehensive suite based on state-of-the-art technologies that brings strong security to your IoT Systems.

Discover the IoT Secure Suite

Keep in touch with us

Sign up for our newsletter to stay updated on new products and services.

  I have read and agree to the Privacy Policy

Register

PARTNERS