What we do

We help creators of smart and connected devices (in the field of automotive, home automation, industrial and medical) to design, develop and operate their systems with the proper level of protection and to keep them protected over time.

The object of our activity is the “system”, which can be either a single device, a piece of equipment composed of several interconnected devices, or an ecosystem that includes embedded devices, mobile apps and the cloud.

By the term protection, we mean the mitigation of the risk that threats materialize through the exploitation of vulnerabilities related to electronic systems. Namely, this is accomplished by protecting:

• The Firmware that is executed on the embedded systems;
• The communication between entities belonging to the system;
• Access to system functionalities;
• Keys that are needed for the operation of the system.

Security is a process

No single component is capable of addressing all security problems: security is a blend of HW, SW and procedures designed and combined to ensure the highest level and to resist future threats still unknown.

1.

Study the security requirements of the device, system, task

We take into consideration and analyze every aspect of the device / system / task: communication between entities, authentication of entities within a system, creation and management of keys and storage of sensitive data.

2.

Identify vulnerabilities and assess their impact

We help creators gauge their devices, systems and activities in order to identify relevant assets and the possible threats they are exposed to.

3.

Propose countermeasures suited to the specific context

We propose to architects and designers possible countermeasures and we define together the security requirements suitable to their systems’ specific context.

4.

Develop the elements necessary to fulfill the security requirements

We either directly implement countermeasures or we provide developers with references, prototypes, IPs necessary for state-of-the-art implementation of the requirements.

5.

Manage and maintain elements that support security on behalf of customers

Security spans the entire life of the device, because what is secure today might be broken tomorrow. Every aspect of a device / system / task must be constantly monitored and updated to resist new threats.

6.

Educate about the security of connected devices

The dissemination of the culture of security in general is essential to promote our activity. We provide introductory courses that are useful for designers and developers; specific trainings on security-related topics are available.

Our key competencies

System Security

Analysis of system assets and definition of system level requirements for the entire life cycle of the product/service

Device specification

Orchestration of all the security ingredients of an embedded system: microcontroller, secure element, communication modules...

Cryptography

Selection and implementation and usage of cryptographic algorithms for embedded systems

Board level protection

Know-how on state of the art attacks and development of effective countermeasures

Protocols

Analysis, definition and usage of security protocols for protecting communication channels

Methodologies

Methodologies and tools to evaluate and guarantee the robustness of the solutions devised. Support for certification

Our new services

IoT Security Check-up

IoT Security Check-up

IoT Security Check-up is the most efficient and cost effective service for security architecture review of IoT platforms.

Our team of Security Experts will perform a deep analysis of your IoT platform to determine the threat exposure level and to define which countermeasures can be implemented to prevent cyber-attacks.

IoT Secure Suite®

IoT Secure Suite®

Our IoT Secure Suite® offers security solutions tailored to the true needs of each use case, in order to extend the protection to as many as possible smart and connected devices.
With our IoT Secure Suite® we provide our customers with access to a unique security process capable of building a secure IoT infrastructure, taking into account all relevant system components (Client Protection, Data Protection, Cloud Protection, Channel Protection).

Security Update and Monitoring

SUM - Security Update and Monitoring

SUM is a vulnerability management service intended for IoT device manufacturers. With SUM you keep your IoT device secure during its entire lifecycle.
We promptly identify and report vulnerabilities of your IoT device through continuous monitoring of public and private sources. We then propose mitigations and remediations to effectively fix or reduce the impact of the vulnerability.

Penetration Testing

Penetration Testing

We are committed to deliver the most secure solutions for IoT devices and embedded systems and one of the cornerstones of the Secure Development LifeCycle (SDLC) is the verification of device security that can be achieved by third-party penetration testing.

The goal of penetration testing is to identify weaknesses through in-depth testing.

Cybersecurity Consultancy

Cybersecurity Consultancy

We are a dedicated team of professionals with solid expertise in the fields of cybersecurity, cryptography, microprocessors, security protocols, security certification, and more!

We are particularly strong in cybersecurity applied to embedded systems.

Past Projects, Consulting and Training Activities

Get in touch with us

Are you looking for more information or for professional consulting?
Fill in the following form to get in touch with us:

  I have read and agree to the Privacy Policy

Send