Embedded Security is Gaining Importance in Many Areas
With enthusiasm and many years of experience, we support you in the certification of various CPU systems and software components. So, among other things, we are also your reliable partner when it comes to implementing your ideas of embedded security in reality. An "embedded system" is understood to mean a self-contained, fixed-functionality information processing system embedded within a large program. In terms of IT security, this means that the specific function of the embedded program is to protect against all potential cyber attacks.
Embedded Security deals with the information security (IT security) of all interconnected or embedded systems. This is done by applying measures against unauthorized manipulation in the procurement, transmission, processing and storage of network information. As an IT expert, it is our job to set up your embedded systems and continuously develop them in terms of security for lasting protection. For while the specific function of embedded security is already known at the time of development and is programmed accordingly, the potential threat of an attack can change over the course of the system's operating time.
Due to the global networking of the digital world, useful value-added services and value-added potential are being created - for example in vehicle technology (autonomous driving), energy supply (smart grid systems), medical technology (telemedicine), office technology (interactive walls) and consumer electronics (smart TV).
At the same time, the increased connectivity also increases the likelihood of potential threats. To prevent this as much as possible, most programmable electronic devices are already factory-provided with an access protection function. In this case, this is referred to as "embedded security", with the access protection function performing the following tasks:
- the protection of the system from possible cyber attacks
- the protection of the environment and the system against possible damage resulting from the infringement or restriction of availability, integrity or the degree of confidentiality.
When it comes to programming and setting up such security systems, we are your competent partner. Through security measures, we not only keep the respective functions intact but also optimize them continuously.
This is necessary because reality shows us time and again that absolute protection does not exist. In order to minimize the residual risk that is always present in programs and networks, we offer you our first-class solutions. We regularly train engineers in embedded software development for embedded security and functional security, which allows us to bring countless experiences, knowledge and technologies from over 270 projects and research projects into your project.
A Certified Security Expert for Your Project
We continuously train engineers in software development for functional safety. The procedures for avoiding systematic weaknesses in embedded security can be taken from the development processes of functional safety and applied. Each team is supported by a certified expert in embedded security. Many experiences, knowledge and technologies from over 270 projects and research projects can be brought together in your project.
- Threat and Risk Analysis
- Software Lifecycle
- Process Models
- Change Management
- Memory/Space Protection Mechanisms
- Encryption and Signatures
- Testing on Target
- Communication and Protocols
- Secure Boot Loader Mechanisms
- Project Management
- Software Development
- Verifikation & Validation
- Component Certification
Mentoring and Training
We support your project from concept inspection to certification by an independent approval body. At all stages we can contribute with experience, tips and tricks to ensure the success of the project.
With a flexible board support package (BSP) for your hardware, possibly supplemented by an optimized real-time kernel to the requirements of your project, we can work out an individual certified platform for you.
Guarantee and Trust
We are committed from the very beginning to your project and provide you with full support for the realization of your vision. Driven by the enthusiasm of the team work and the fun on the joint success of your project.
During development of the (sub-)system components we convince with loyal and faithful implementations and pro-active thoughts for the behavior of the component and the security level capability for the overall system.
You are Interested in Embedded Security ...
Arrange an expert meeting
We offer a free and non-committal interview with one of our experts. We can get to know each other, answer your open questions and also discuss the first requirements of your project.
Related Products and Services
The so-called Flexible Safety RTOS is the real-time kernel with memory protection, pre-certified for applications in the field of functional safety according to IEC 61508, ISO 26262 and IEC 62304
For a first impression of the nature and extent of completed projects, we have put together a small selection for you. For more details read: Reference Projects.