|||

From our Lab to the Market

Meet our 3 apps providing end-to-end cyber protection for IoT architecture

Authentication

Create, store and distribute digital certificates to secure the transfer of information from your connected devices or gateways

Signature

Digitally sign firmware to securely upgrade a connected device Over-The-Air (FOTA)

Key Management

Manage the lifecycle of your cryptographic keys

Authentication

The authentication app creates, stores and distributes digital certificates which are used to secure the transfer of information, assert identity information and verify the authenticity of messages through public key cryptography and digital signatures.


In a Public Key Infrastructure (PKI), digital certificates are issued by a Certificate Authority (CA) and bind public keys with identities (e.g. connected devices or gateways).


The application is available either integrated in a physical appliance deployed On Premises or As A Service from our datacenter in Switzerland. In both cases, the keys are stored in a physical Hardware Security Module (HSM).

Signature

The signature app allows to authenticate and encrypt any piece of code or SW that is critical. Typical use case is Firmware Over-The-Air (FOTA) in which the operating firmware of a connected device is wirelessly upgraded and updated.


The application is available either integrated in a physical appliance deployed On Premises or As A Service from our datacenter in Switzerland. In both cases, the keys are stored in a physical Hardware Security Module (HSM).

Key Management

The Key Management System (KMS) offered by CYSEC allows you to generate, use, rotate, and destroy the cryptographic keys you are using during their entire lifecycle.


This app will facilitate the use of the authentication and signature applications and is compatible with any
AES, EC or RSA keys.


The application is available either integrated in a physical appliance deployed On Premises or As A Service from our datacenter in Switzerland. In both cases, the keys are stored in a physical Hardware Security Module (HSM).

The security of hardware combined with the flexibility of the cloud

All-In-One

Applications already integrated in ARCA and ready to use

Secure

Storage of keys in a physical Hardware Security Module (HSM) even for As A Service

Flexible

Start with our As A Service model then easily transfer your digital assets On Premises

Scalable

Secure an unlimited number of objects with only one subscription

Flat Pricing

The more devices you secure, the more you save!

Compatible

Secure your architecture regardless the network or the protocol

Monthly subscriptions available !


Receive detailed pricing

Latest Cysec News