View
Sorting
From A to Z
Products found: 2
Secure-IC Analyzr
Analyzr is the most advanced post-silicon security evaluation platform on the market. The target to evaluate can be any embedded system, ranging from testing chips as FPGA, ASIC and Micro-controllers to end-user devices such as IoTs, smartphones, smart cards and automotive eletronic circuits.
Our scientists have authored some of the most advanced and highly regarded side-channel analysis and protection methodologies.
Advanced modules
- Preprocessing
- 6D-Cartography
- NICV Analysis
- Fault Exploitation (DFA)
- Report Generation
- ISO-17825 standard
- State-of-the art attacks
- Single integrated tool for Side-Channel Analysis and Fault Injection Attacks
- Classic & advanced techniques
- Analyze standard or self –authored algorithms
- Unique ability to analyze leakage at the bit level, and precisely measure security-level
- Real-time acquisition, analysis and processing
- Intuitive graphical interface
- Standard packages for beginner or expert users
- Customizable packages
- One-button, analysis reports automatically generated
- FIPs-140 and ISO-17825 ready
-
-
ROI-
-
6
9
Secure-IC Securyzr
Secure-IC is able to supply embedded Hardware Security Modules that can act as trust anchors that protect the security setup of a company. A hardware security module is an IP block that can be embedded into every device to answer security functionalities such as root-of-trust and key management.
Secure-IC Securyzr provides the core security services required to build a security architecture for a wide variety of devices: mobile, connected object, a payment device, smart card, ECU, Set-Top-Box, and HSM.
Key features:
- Customizable API
- Proven Security & Certification ready (market specific and security certified)
- Full digital solution
- Automotive
- AioT & Edge
- Media & Entertainment
- Consumer Electronics
- Defense & Government
- Trusted Computing & Cloud
- Memory & Storage
- Payments & Transactions
- End-to-end, best of breed solutions
- Root-of-trust: Secure Boot and Secure Secret Storage (unique ID, secret key)
- Security Monitoring: Secure Debug, Lifecycle Management
- Strong tamper resistance: fault injection and perturbation attacks resilience
- Data protection ensured
-
-
ROI-
-
3
1
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.