We help creators of intelligent connected devices to design, implement and operate their systems with a sustainable security level.
It should be a habit to consider security aspects when dealing with any man-made system. We promote an approach that does this since the system's conception and on to its design, implementation and deployment, up to its decommission.Learn more about our “Security Pattern”
Each member of our technical team gained a pluriannual experience in the domains of security and crypto for microcontrollers, smartcards, automotive, wireless connectivity, ASIC and FPGA.
We are active participants in the cryptographic research community and we are part of standardization bodies such as Bluetooth, IEEE and various other consortia.
Guido is co-author of the NIST SHA-3 algorithm.Check our experience
As devices become increasingly connected, we need to design-in enough protection to secure them against emerging threats.
This is why we developed a comprehensive suite based on state-of-the-art technologies that brings strong security to your IoT Systems.