Trusted products and services for embedded security. Join-us on Linkedin

A connected world

With the advent of low cost – high bandwidth- low latency connectivity, the increased use of digitization techniques to deliver end-to-end intelligence, many industrial sectors are combining microelectronics and embedded software to deliver real time interactions between the physical and the digital worlds leveraging on complex IT infrastructures of interconnected devices, systems, systems-of-systems, edge and cloud services.

This creates attractive business opportunities for hackers that could exploit the large surface of attacks exposed by those complex infrastructures to extort money, potentially threatening to cause remotely physical damage to users or surrounding equipment.

The cybersecurity issues

In effect, the deployment of those complex IT infrastructure of inter-connected devices and services creates a new set of security challenges:

Different security model

While Traditional IT entreprise network and IT system are operated by people and employees in a controlled environment, connected devices are in the wild, with little to no user interaction.

Potential damage

Connected devices may either be deployed at large scale or embark multi-purpose and generic processors that are used to replace electronic functions. When reprogrammed by hackers, they may cause a lot of harm.

Infinite window of opportunity

At least, one sample device will get into the hands of the hackers and will be reverse engineered. Flaws and weaknesses will be found.

Security-by-design

Security shall be integrated at every stage of product’s development, covering the entire product life-cycle. Traditional methods like detection and surveillance are important, but may be too late and/or not scalable.

Remote scalable attacks

Are the main vector that will used by hackers sooner or later, as it offers attractive business models for them: the cost of deployment is negligible even if their investment for designing the attacks may be high (>1M$).

Regulations

Cybersecurity is a growing concern, and government are investing in new regulations to ensure that security is included at the design stage of the product. Those that do not meet the requirements will not go to the market.

Challenges associated to the cybersecurity issues

How we can help

At ProvenRun, we provide to our customers the Trusted Products and Services that will help them Embed Security within their infrastructure of connected devices and services wherever this is required, e.g at the chip, device, systems, edge and cloud levels with our: