Connected systems are extremely vulnerable to network attacks because:
Especially IoT or simple devices like trackers or wearables are often unprotected due to simple reasons:
▸IoT devices are mostly low power devices and lack computing performance
▸There are too many unprotected data end-points to protect them with a separate security system
▸There are too many diversified data objects transmitted
▸Communications should be real-time for many applications
Our product proposition has a primary target to ensure end-point security for such communication devices by integrating a secure Root of trust hardware element.
Combines root of Trust and GSMA eSIM functionality
▸Ensures connection to virtually any mobile network world-wide and easy profile management based on GSMA eSIM standards
▸Supports multiple discrete hardware platforms and can be integrated on SoC
▸Implements hardware-level isolation for eSIM, native customer applications and RoT data
We deliver secure elements in various form factors and on different hardware platforms
M2M - Industrial and Consumer grades SEs
Form factors: MFF2, 4FF/3FF White cards , WLCSP
Loose cards/chps or tape
Our applications and middleware significantly simplify integration of hardware-based security into constrained devices
Integration into device SSL Stacks
EAP-TLS Authentication,
Mobile PKI, PKCS#15/SEAC
Trustels Group of Companies
All rights reserved.