Mar 27, 2017

Trusted Objects, a security expert for the Internet of Things (IoT), in partnership with Avnet Silica and UbiquiOS technology, announces the availability of its secure TLS solution, allowing end-to-end sensor-to-server security to billions of sensors regardless whether they support the IP (Internet Protocol) or not.

Feb 27, 2017

Avnet Silica, Actility and Trusted Objects demonstrate an unrivalled level of end-to-end security between a LoRaWAN Visible Things sensor and a cloud-hosted backend over a ThingPark Wireless powered private network, thanks to a hardware-based security solution.

TRUSTED OBJECTS

Our vision is that end-to-end security - including at the device level - is a critical success factor for the IoT revolution.

Our mission is to provide embedded firmware and services to enable state-of-the-art hardware based and cost-effective security solutions to protect the connected objects and machines.

Proven technology

Trusted Objects solutions and services are based on long-standing and proven smart technologies. They are adapted to meet the requirements of the IoT including user convenience and time to market.

Cost effectiveness

Smart security technologies used by Trusted Objects are optimized to provide cost effective solutions without compromising security.

Low power for long life

The ultra low power consumption of security solutions enabled by Trusted Objects will have little impact on the object battery lifespan.

Our blog

Mar 28, 2017

WikiLeaks recently released documents on a program called “Weeping Angel” that allowed spy agencies to install software on smart TVs. Even when the TV is switched off, it could listen in on conversation!

Feb 22, 2017

The DDoS (Distributed Denial-of-Service) occurrences are in everyone’s mind! Over the last few years, there has been an increase both in terms of number of attacks and scale of the attacks. Typically, a DDoS attacks consists in overwhelming a server by a number of requests it cannot handle. To complete a DDoS attack, hackers use relays: they take control of easy targets and use these targets to trigger the attack on the server itself.

Jan 31, 2017

According to the Identity Theft Resource Center, 900 major data breaches were recorded worldwide in 2016, up from 783 in 2014. In the hyper connected world, this is not really a surprise!

Partners

Contact us

This is a captcha-picture. It is used to prevent mass-access by robots. (see: www.captcha.net)
Please confirm that you are not a script by entering the letters from the image.