• Français
  • English


IoT device manufacturers and service companies associated are now forced to (re-)evaluate securityduring all phases of their products’ life cycle.

The massive proliferation of Internet-connected objects associated with an increasing number of attacks targeting them and increasing applicable regulations (Cyber Resilience Act, NIS 2, ETSI EN34343, IoT Consumer…) lead to highly consider security of devices and protection of intellectual property as major concerns for already deployed devices or future developments.

Main challenges

Best security practices consist in reinforcing the level of security during the design of your product or when you are selecting your suppliers. Protecting sensitive data of your users very often come up against strong operational and financial constraints amplified by factual difficulties to master security on the whole IoT value chain (application, cloud, hardware, firmware).

Managing and auditing your already deployed products (or your subcontractors) can also be deemed very complex and require outsourcing security analysis to neutral and specialized experts (for reverse engineering, cryptography, methodology, tools…).

Our solutions

From the design phase to the post-deployment phase, our end-to-end security expertise (cloud, hardware, software, back-end and low-level) and our ITSEF lab approval will allow youto benefit from advanced support and advicein the design phase and from comprehensive audits and reports for your already deployed products:
  • expertise in reverse engineering and applied cryptography
  • solid understanding of the complete ecosystem and the operating context of your solutions
  • specific tools to emulate the architectures (Triton, …)
  • reactivity and ability to understand your needs and technologies – sometimes in a tripartite relationship – and with strict deadlines.
To access the main works realized by our teams: visit our blog