Attacks on connected devices will only get worse and more sophisticated, with plenty of potential entry points impacting device security. If an IoT security incident occurs, this paper provides insights into steps to take.
This paper describes how to establish a supply chain of trust, create a root of trust and a solution for secure provisioning and programming of Secure Elements and Secure MCUs.
A look at how to manage keys and certificate structures and enable secure software updates using a secure boot manager.
This presentation outlines a holistic approach to security requirements for IoT devices, including certificate structures and methodology for developing certificate hierarchy.
Currently, few IoT OEMs use root of trust-based hardware when developing their products. With growing visibility of IoT cyberattacks, this white paper introduces secure provisioning and manufacturing.
The “supply chain of trust” includes silicon vendors, embedded software companies, programming solutions providers, and OEMs. This white paper looks at establishing a “zero trust” approach.
The root of trust is the baseline for an IoT device’s trust, and different vendors take different approaches. This white paper outlines the approach of creating a certificate structure in a device.
Data sheet on Secure Thingz’ Secure Deploy™ architecture, the most advanced and integrated solution, to deliver the supply chain of trust.
This data sheet introduces Secure Deploy architecture and how it enables secure devices.
This video outlines the Renesas Synergy (in conjunction with Data I/O and Secure Thingz) secure programming environment for manufacturing and remote updating of IoT devices.
1065 E Hillsdale Blvd # 420, Foster City, CA 94404, USA | Secure Thingz Ltd, Harston Mill, Harston, Cambridge CB22 7GG
Copyright © 2018 SecureThingz. All rights reserved.