Feb 25, 2019

Trusted Objects, a specialist in security for the Internet of Things, is proud to announce that its TS Defender secure software solution is now available on the Murata LoRaWAN™ module, making it easy for IoT application developers to implement enhanced security measures in their products.


Our vision is that end-to-end security - from device to cloud - is a critical success factor for IoT deployment.

Our mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Proven technology

Trusted Objects solutions and services are based on long-standing and proven smart security technologies. They are scalable and adapted to meet the requirements of the IoT market, from the design phase to the product life management..

Secure digital identity

IoT complex ecosystem requires a robust root of trust. Trusted Objects solutions and services provide secure digital identity to connected devices making each device unique and protected against logical and physical attacks. Compliance with existing and future regulations on data protection (GDPR, NIS and others) is facilitated.

Integrability and cost-effectiveness

Security technologies developed by Trusted Objects are easy to integrate into the IoT value chain and are optimized to provide cost-effective solutions while significantly reinforcing security.

Our blog

Mar 26, 2018

Facebook is under criticism as a political consulting firm was able to harvest raw data from 50 million profiles. This raises once again critical questions regarding data privacy: to whom the data belongs and who is responsible to protect it?

Mar 13, 2018

There are strong signs indicating that 2018 will be the year of the IoT ramp-up and the whole industry is now analyzing how to bring the numerous pilot projects to production.

Feb 22, 2018

It could be the title of a science-fiction movie!  Meltdown and Spectre are hardware vulnerabilities allowing programs to steal data from computers or mobile phones. Large companies are reacting, claiming that corrections have been deployed thus making our machines safe. What about IoT devices?







Contact us

This is a captcha-picture. It is used to prevent mass-access by robots. (see: www.captcha.net)
Please confirm that you are not a script by entering the letters from the image.