Nov 12, 2018

Trusted Objects, a specialist in security for the Internet of Things, and Secure IC, an expert in secure solutions for embedded systems, are proud to announce TS Defender, their joint solution that delivers an easy to implement and highly secure solution to tackle the most common physical attacks on IoT devices.

Jun 25, 2018

Avnet and Trusted Objects, announce a new step in Edge Device to Cloud security with a NB-IoT demonstration running the CoAP protocol adapted to resource-constrained communication conditions.

TRUSTED OBJECTS

Our vision is that end-to-end security - from device to cloud - is a critical success factor for IoT deployment.

Our mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Proven technology

Trusted Objects solutions and services are based on long-standing and proven smart security technologies. They are scalable and adapted to meet the requirements of the IoT market, from the design phase to the product life management..

Secure digital identity

IoT complex ecosystem requires a robust root of trust. Trusted Objects solutions and services provide secure digital identity to connected devices making each device unique and protected against logical and physical attacks. Compliance with existing and future regulations on data protection (GDPR, NIS and others) is facilitated.

Integrability and cost-effectiveness

Security technologies developed by Trusted Objects are easy to integrate into the IoT value chain and are optimized to provide cost-effective solutions while significantly reinforcing security.

Our blog

Mar 26, 2018

Facebook is under criticism as a political consulting firm was able to harvest raw data from 50 million profiles. This raises once again critical questions regarding data privacy: to whom the data belongs and who is responsible to protect it?

Mar 13, 2018

There are strong signs indicating that 2018 will be the year of the IoT ramp-up and the whole industry is now analyzing how to bring the numerous pilot projects to production.

Feb 22, 2018

It could be the title of a science-fiction movie!  Meltdown and Spectre are hardware vulnerabilities allowing programs to steal data from computers or mobile phones. Large companies are reacting, claiming that corrections have been deployed thus making our machines safe. What about IoT devices?

Partners

    

 

    

 

cea_tech_logotype    Logo NetObjex

Contact us

This is a captcha-picture. It is used to prevent mass-access by robots. (see: www.captcha.net)
Please confirm that you are not a script by entering the letters from the image.