Secure-IC launches a unique cybersecurity lifecycle management platform for connected objects
Press Release
Cesson-Sévigné (France), February 24th, 2022 – After recently announcing its capital raise to support its “Chip to Cloud” vision, Secure-IC, the rising leader and only provider of end-to-end cybersecurity solutions for embedded systems and connected objects announced today the launch of a unique cybersecurity lifecycle management platform for connected objects (SecuryzrTM integrated Security Services Platform).
Secure-IC has been providing the electronic industries, for over a decade, with its protection technologies, namely the SecuryzrTM iSE (integrated Secure Elements) and Silicon IPs which are embedded into hundreds of millions of electronic chips for smartphones, computers, automobiles, smart meters, cloud servers and more.
The semiconductor industry is now aware that integrated Secure Elements (iSE) are the solution to protect their System-on-Chips, across the supply chain of vertical industries (automotive, industrial IoT and OT, AI, Telecom, New Space). The iSE typically enables secure provisioning, and therefore proactively fights against master compromising, malware/Trojan insertion, overbuilding, etc. Then, after deployment, the Edge product must remain on the safe and secure side. Even better, security must be maintained at the desired level despite the fact that adversaries are becoming increasingly sophisticated.
Nowadays, fleets of connected devices have operational needs to maintain over time a relevant level of security, monitor their status and securely update their firmware. Therefore, beyond the physical security of electronic chips, Secure-IC intends to cover the entire security lifecycle of connected objects and embedded systems, from their design through the management of fleets of deployed devices up to their decommissioning.
That is why, Secure-IC has developed the SecuryzrTM integrated Security Services Platform (iSSP) to enable its customers and partners to securely supply, deploy and manage a fleet of devices from the cloud and be provided with added-value security services, as well as compliance to standards.