Trusted Products & Services
Our perfect embedded cybersecurity
A Connected World
With the advent of low cost – high bandwidth- low latency connectivity, the increased use of digitization techniques to deliver end-to-end intelligence, many industrial sectors are combining microelectronics and embedded software to deliver real time interactions between the physical and the digital worlds leveraging on complex IT infrastructures of interconnected devices, systems, systems-of-systems, edge and cloud services.
This creates attractive business opportunities for hackers that could exploit the large surface of attacks exposed by those complex infrastructures to extort money, potentially threatening to cause remotely physical damage to users or surrounding equipment.
Different security model
While Traditional IT entreprise network and IT system are operated by people and employees in a controlled environment, connected devices are in the wild, with little to no user interaction.
Potential Damage
Connected devices may either be deployed at large scale or embark multi-purpose and generic processors that are used to replace electronic functions. When reprogrammed by hackers, they may cause a lot of harm.
Infinite Windows of Opportunity
At least, one sample device will get into the hands of the hackers and will be reverse engineered. Flaws and weaknesses will be found.
Security-By-Design
Security shall be integrated at every stage of product’s development, covering the entire product life-cycle. Traditional methods like detection and surveillance are important, but may be too late and/or not scalable.
Remote Scalable Attacks
Are the main vector that will used by hackers sooner or later, as it offers attractive business models for them: the cost of deployment is negligible even if their investment for designing the attacks may be high (>1M$).
Regulations
Cybersecurity is a growing concern, and government are investing in new regulations to ensure that security is included at the design stage of the product. Those that do not meet the requirements will not go to the market.
Shield Yourself From Unexpected Threats
ProvenRun offers security consulting services to help customers answering to the security challenges of their infrastructure of connected devices and services. Our consulting services rely on our solid expertise in the field of security and in-depth knowledge of the challenges of different business sectors such as automotive, aeronautics, railways, energy, mobile telecommunication operators and defense.