We promote Security by Design, an approach to software and hardware development where security is built-in from the beginning and not as a late addition after an incident.
This philosophy is incorporated in all the points of the development lifecycle: from concept to deployment.
HOW WE ACHIEVE IT
Common protection measures we implement:
‣ Secure hardware platforms and elements ‣ Active tamper detection and tamper-evident features ‣ Encryption of stored data and keys ‣ Digital signatures with one or multiple parties ‣ Secure bootloaders and over-the-air upgrade ‣ Use of proven protocols like TLS, HTTPS, and IPsec
Finding vulnerabilities in the security systems before it happens could save a company's time, profit, and trust.
Along with in-house security review, we offer assistance with third-party evaluation of cryptographic modules by independent laboratories. We have successfully managed to acquire FIPS 140-2 and local certificates for our client's products.