Jan 18, 2022

Trusted Objects’ TO-protect integration with Device Authority’s KeyScaler IoT IAM Platform.

“Trusted Objects and Device Authority session at the IoT Security Summit hosted by Device Authority 

Oct 13, 2021:   3:00 pm UK / 4:00 pm CET 2021

How to ensure Trust & Security for MCUs without TF-M, TPM or Secure Element chip ?

In this session Trusted Objects and Device Authority will discuss the alternatives for providing Root of Trust (RoT) on devices which don’t have MCUs with TF-M (TrustZone) nor a TPM or Secure Element chip. Alongside this the speakers will be discussing how coupling a software RoT with security automation makes Edge to Cloud possible for large scale IoT, including legacy IoT devices.”



"tops plug&go, which is part of Trusted Objects to-security offer, is a new set of services that brings security and efficiency at all stages of electronic devices manufacturing process."








to-protect an innovative secure software library to protect IP in embedded software and to enhance security in IoT applications. A cryptography and security expert shares his views on a LoRaWAN use case”


Our vision is that security-by-design, end-to-end security and life cycle management are the key principles to build a better and safer connected world.

Trusted Objects and its partners share a mission for helping our customers protect their sensitive data and critical intellectual property with easy-to-integrate , scalable and cost-effective industrial security solutions.

Proven technology

Trusted Objects solutions and services are based on long-standing and proven smart security technologies. They are scalable and adapted to meet the requirements of the edge security market, from the design phase to the product life management.

Secure digital identity

Complex ecosystems such as software IP protection or the Internet of Things require a robust root of trust. Trusted Objects solutions and services provide secure digital identity and interaction with connected devices making each device unique and protected against logical and physical attacks. Compliance with existing and future regulations on data protection (GDPR, NIS and others) is facilitated. 

Integrability and cost-effectiveness

Security technologies developed by Trusted Objects are easy to integrate into the cybersecurity value chain and are optimized to provide cost-effective solutions while significantly reinforcing security.

Our blog

Oct 13, 2021

According to IC Insights, 18 semiconductor wafer fabs were shut down in Europe between 2009 and 2018. Since 2020, Europe is facing a severe semiconductor shortage which is impacting our industries, specifically the automotive sector. We are now realizing that Europe is dependent from Asia and USA for semiconductor supply.

Jun 22, 2021

The "security by design" approach is gaining momentum. Despite this positive trend, we observe that the choice of a comprehensive security solution covering IoT device full life cycle is not enough taken into account.

May 18, 2021

Embedded systems and IoT systems are increasingly exposed to a wider range of new security threats, and this trend will accelerate. Unfortunately, in ecosystems where the supply chain is complex, selecting and implementing the right security could be challenging. Furthermore, it is frequent that managers making decisions on security levels are not the ones who will be held accountable for their choices.

Strategic partner






Contact us