to-security

Unique and comprehensive solution from security integration up to security life cycle management

to-security provides a fully integrated approach for IoT systems protection at scale, divided in three major steps:

 

Protect

  • The protection at the edge device is reached with to-protect  and tops secure products.

  • to-protect secure software library is designed for generic MCU-based devices and enables critical security functions such as secure authentication, data transfer integrity and confidentiality, secure storage, secure boot and secure firmware update.

  • tops plug&go ensures credentials and firmware protection at the programming house and secures commissioning of the applicative server.

 

Detect

  • An embedded software stack at the edge enables detection of attacks attempts and malware.

  • Based on to-protect and a security agent, this software stack detects malware at boot and during firmware update, fault injection, device behavior anomalies and others.

 

Manage and update

  • to-cloud handles the IoT security lifecycle management operations in the cloud.

  • These operations include  credentials management (PKI – KMS), monitoring, anomalies detection and processing , secure firmware update, secure credentials update and security access policy.