IoT Security

We secure your IoT products

/pages/images/security-concepts.jpg

Secure IoT Products

Billions of IoT devices exist worldwide, with each of these devices promising added value for users; both in private households and industrial plants. Therefore, a manufacturer bears significant responsibility. We support you in all stages of development, starting from hardware & firmware, mobile & web apps, related backends & APIs and (cloud) infrastructure.

/pages/images/security-end-to-end.jpg

Everything considered

With our holistic approach, we support you from security training and workshops, through design and implementation, to security audits and penetration tests of your IoT product. We base our approach on the Secure Development Lifecycle, as well as Security- and Privacy-by-Design. This enables us to meet all requirements of ISO 27001, IEC 62443, and VDE Smart Home.

Our focus areas

Security Trainings & Workshops

Security Trainings & Workshops

In our trainings and workshops we review the domains security and Privacy by Design, Top 10 OWASP IoT Security, Public Key Infrastructure (PKI) as well as Hardware Security Module (HSM) and Threat Modeling.

Security Design

Security Design

While developing security concepts, we advise you not only on the basic questions of architecture, protocol, infrastructure and operation, but also on specific topics such as secure onboarding, OTA firmware updates, public key infrastructure (PKI) and threat modeling.

Security Implementation

Security Implementation

During our implementation, we proceed according to the Secure Development Lifecycle within an agile development environment. This is supported by regular code reviews, our DevSecOps and extensive tooling experience.

Security Audits & Penetration Tests

Security Audits & Penetration Tests

From blackbox, greybox or whitebox analyses of devices, backends, APIs, frontends or infrastructure to identification of attack vectors with individual risk assessment, code analysis, fuzzing (protocols, libraries and binaries) to Proof of Concept Exploits.

Success Stories

Get in touch

We are here for you


Are you interested in connecting your products and components?
Write to us:

hello@grandcentrix.net