Security

Because a product cannot be developed
without considering security,
our dedicated team strives to deliver
the most secure version of your product as possible.

Because a product cannot be developed
without considering security,
our dedicated team strives to deliver
the most secure version of your product as possible.

securite des objets iot

Security by design

WE CONSIDER THE SECURITY ASPECT RIGHT FROM THE PRODUCT

DESIGN STAGE.

OUR TEAM KNOWS THE MISTAKES TO AVOID AND THE PRINCIPLES TO ADOPT TO PREVENT FLAWS IN THE FUTURE.

 

security by design
security by design

If you have a product that is already on the market

and you want to bolster its security,

our team offers you a 4-step service:

4 phases securite objets connectes

ANALYSE

Define the right level
of security required

EVALUATE

Know the robustness
of your product or its solution

SECURE

Adjust your product to the desired level of security

MONITOR

Guarantee its non-vulnerability
over time

analyser son produit

ANALYSE

Define the right level
of security required

evaluer son produit

EVALUATE

Know the robustness
of your product / solution

securiser son objet connecte

SECURE

Adjust your product to the desired level ofsecurity

veiller

MONITOR

Guarantee its non-vulnerability
over time

analyser son objet connecte
analyser les risques

Analyse

Identify the risks that are threats

Define the right level of security

probabilité risque securite iot

RISK ANALYSIS

Detect critical processes,
potential vulnerabilities and threats, their probability of occurrence.

RISK MATRIX

Propose a classification of risks according to their impact
(human, financial, etc.) and probability.

probabilité risque securite iot

Evaluate

Know the robustness of your
solution

Assess the security level according
to international criteria and standards.

PRE-DIAGNOSTIC

Analyse the overall solution architecture: hardware, software, wireless
communication, mobile, cloud.

DETECT AND IDENTIFY VULNERABILITIES

Test the robustness of your product, assess the security level (OWASP ASVS), ensure GDPR compliance.

ecaluer son objet connecté
evaluer son objet connecté

Test

EVALUATE THE SECURITY OF YOUR CONNECTED OBJECT

test de penetration

Standard tests targeting specific vulnerabilities.
The test is not comprehensive but ensures that the most common vulnerabilities are covered.

In-depth vulnerability search. 
Objective: hack the product.

According to
your customer needs.

test de pénétration

Standard tests targeting specific vulnerabilities.
The test is not comprehensive but ensures that the most common vulnerabilities are covered.

Test de pénétration

In-depthvulnerability search.
Objective: hack the product.

Test de penetration à la carte

According to
your customer needs.

Secure

Adjust your product to the right level of security

 

RECOMMENDATIONS

Definition of corrections to implement in terms of the risk level.
Support for hardware, firmware and software teams, from
development to deployment: management, reviews, tests, etc.

 

DEPLOYMENT

Support and implementation of patches

Monitor

Guarantee security over time

 

SEPCIFIC INTELLIGENCE

The last identified vulnerabilities affecting your architecture.
Generate alerts
Annual report

TRAINING

Tailor-made fundamentals:
training tailored to your needs,
from hardware to the cloud.

Rtone in the Paclido project

Because Rtone is committed to security

 

OBJECTIVES

  • Develop lightweight encryption algorithms and protocols for IoT
  • Develop a detection system for attacks targeting IoT
  • Uses in home automation, smart city, industry 4.0
  • Algorithms submitted at the end of 2018 to the NIST LWC standardisation competition
  • Deployment planned for public lighting in Saint Quentin en Yvelines in late 2020

 

paclido

Lightweight
Cryptographic Protocols and Algorithms for
the Internet of Things

  twitter paclido.fr

 

With the support of

region auvergne rhones alpes bpi

 informez vous

 

Stay up to date

RTONE-SECURITY NEWSLETTER

The latest attacks listed.
The last identified vulnerabilities.

SECURITY INFO BLOG

The latest information.
Upcoming events.
Everything you need to know about standardisation

X