Our Solutions and Services

Connected systems are extremely vulnerable to network attacks because:

  • 90% of devices store personal data and information
  • 60% of devices have user interface vulnerabilities
  • 80% of devices have got weak  passwords
  • 70% of devices transmit unprotected data
  • 60% of devices download software without proper security

Especially IoT or simple devices like trackers or wearables are often unprotected due to simple reasons:

▸IoT devices are mostly  low power devices and lack computing performance
▸There are too many unprotected data end-points to protect them with a separate security system
▸There are too many diversified data objects transmitted
▸Communications should be real-time for many applications

Our product proposition has a primary target to ensure end-point security for such communication devices by integrating a secure Root of trust hardware element.

 

Secure embedded operating system

Combines root of Trust and GSMA eSIM functionality

Ensures connection to virtually any mobile network world-wide and easy profile management based on GSMA eSIM standards

Supports multiple discrete hardware platforms and can be integrated on SoC

Implements hardware-level isolation for eSIM, native customer applications and RoT data

Hardware secure elements

We deliver secure elements in various form factors and on different hardware platforms

M2M - Industrial and Consumer grades SEs

Form factors: MFF2, 4FF/3FF White cards  , WLCSP

Loose cards/chps or tape

Applications and middleware

Our applications and middleware significantly simplify integration of hardware-based security into constrained devices

Integration into device SSL Stacks

EAP-TLS Authentication, 
Mobile PKI, PKCS#15/SEAC

Trustels Group of Companies

All rights reserved.