Apr 24, 2017

Trusted Objects, a security expert for the Internet of Things (IoT), and UnaBiz, a Singapore-based IoT-dedicated network operator, enter a partnership to deliver hardware-based security to the Sigfox network in Asia.

Mar 27, 2017

Trusted Objects, a security expert for the Internet of Things (IoT), in partnership with Avnet Silica and UbiquiOS technology, announces the availability of its secure TLS solution, allowing end-to-end sensor-to-server security to billions of sensors regardless whether they support the IP (Internet Protocol) or not.

TRUSTED OBJECTS

Our vision is that end-to-end security - including at the device level - is a critical success factor for the IoT revolution.

Our mission is to provide embedded firmware and services to enable state-of-the-art hardware based and cost-effective security solutions to protect the connected objects and machines.

Proven technology

Trusted Objects solutions and services are based on long-standing and proven smart technologies. They are adapted to meet the requirements of the IoT including user convenience and time to market.

Cost effectiveness

Smart security technologies used by Trusted Objects are optimized to provide cost effective solutions without compromising security.

Low power for long life

The ultra low power consumption of security solutions enabled by Trusted Objects will have little impact on the object battery lifespan.

Our blog

Apr 4, 2017

During the recent IoT Asia show in Singapore, Trusted Objects had the opportunity to meet with Dr. Vivian Balakrishnan, Singapore Minister for Foreign Affairs and Minister-in-charge of the Smart Nation Programme Office.

Mar 28, 2017

WikiLeaks recently released documents on a program called “Weeping Angel” that allowed spy agencies to install software on smart TVs. Even when the TV is switched off, it could listen in on conversation!

Feb 22, 2017

The DDoS (Distributed Denial-of-Service) occurrences are in everyone’s mind! Over the last few years, there has been an increase both in terms of number of attacks and scale of the attacks. Typically, a DDoS attacks consists in overwhelming a server by a number of requests it cannot handle. To complete a DDoS attack, hackers use relays: they take control of easy targets and use these targets to trigger the attack on the server itself.

Partners

 

Contact us

This is a captcha-picture. It is used to prevent mass-access by robots. (see: www.captcha.net)
Please confirm that you are not a script by entering the letters from the image.