Embien offers a Secure Boot Service for Edge Device Security

Embien Technologies is proud to announce the launch of new service called secure boot for edge device – a one one-stop shop for all your Embedded IoT Devices based Secure Boot and Data Security requirements.

Embien, being the leading provider of Embedded Hardware & Software Services and Solutions, has come up with a new service named “secure boot for edge device security” that will help lower the increasing menace and safeguard various IoT based business process and practices.

Embien’s expertise on Secure Boot, Data protection & Tamper Detection has enabled the way to incorporate features that initiate protective and reactive actions in times of unauthorized access. Our service offerings include the integration of Linux Security Modules such as AppArmor and SELinux & other defensive mechanisms like OTP Fuses, JTAG/Debugger blocking, debug ports disablements etc. Embien’s Secure Boot for Edge Device Security will help minimize the attack surface and make products more secure. It will ensure that underlying security mechanisms such as High assurance boot (HAB), Trusted Platform Module (TPM), Cryptographic Accelerator and Assurance Module (CAAM), Hardware Cryptographic engines are put to full use.

While speaking at the launch meeting, Embien’s CEO, Mr. Saravana Pandian Annamalai stated “Embien has been in the forefront of embedded device development for more than a decade and has helped vendors design & develop several IoT based products with various cutting-edge technologies. Now, we have decided to assist our customers in creating secure products that will stand the test of time.”

Embien’s Secure Boot for Edge Device Security ensures Client-server mutual authentication, performs security audits, helps adopt security centred development processes & assists in identifying vulnerabilities like Buffer overflow, input validation, argument handling etc., Backed with years of experience in working with latest crypto-graphics algorithms & protocols, Embien is well-acquitted with TLS1.3 implementation on embedded devices. Additionally, compiler defence mechanisms such as executable space protection, address space randomization, stack checks and code obfuscations are employed to protect the system. Periodic reviews can be done, and updates can be carried out securely, while keeping the system protected.