Jun 7, 2022

The partnership value proposition simplifies and reinforces the security of TSIP (Trusted Secure IP Driver) programming process on Renesas RX MCUs.

TRUSTED OBJECTS

Our vision is that security-by-design, secure manufacturing and secure life cycle management are the key principles that must drive IoT security. Applying security principles could be technically complex and current solutions are often incomprehensive due to IoT market specificities.

Our mission is to develop easy-to-use and comprehensive technologies to protect IoT devices, to detect attempted attacks and malware,  and to manage securely the devices life cycle. Our security technologies are particularly adapted to devices with limited computing and communication capabilities.

Proven

Digital security technologies have been protecting consumers and citizens for decades. Trusted Objects adapts these proven technologies to protect IoT devices, to detect attempted attacks and malware, and to manage devices securely. 

Comprehensive

Trusted Objects offers a comprehensive set of technologies to enable edge to cloud IoT security. Our technologies are already deployed in a wide range of IoT applications.

Simple

As IoT systems interact with each other, integrating security is challenging. Our products and solution remove the burden from integrating security into IoT systems.

Our blog

Oct 20, 2022

On October 18th, 2022, the European Commission presented its work program for 2023, including a list of initiatives to address the coming challenges for citizens, enterprises, and governments.

Sep 26, 2022

On September 15, 2022, the European Commission published a proposal for a future “Cyber Resilience Act (CRA),” which aims at setting common cybersecurity standards for connected devices and services. 

May 10, 2022

Trusted Objects, since its inception works relentlessly for making IoT a safer place. The massive deployment of IoT devices we experiment means that the attack surface increases accordingly. For this reason, secure Identity Access Management (IAM) platforms are quintessential in making the connected world a more secure environment. 

  

 

  

    

 

 

Contact us