Security
Because a product cannot be developedwithout considering security,our dedicated team strives to deliverthe most secure version of your product as possible.

Security by design
WE CONSIDER THE SECURITY ASPECT RIGHT FROM THE PRODUCT
DESIGN STAGE.
OUR TEAM KNOWS THE MISTAKES TO AVOID AND THE PRINCIPLES TO ADOPT TO PREVENT FLAWS IN THE FUTURE.

If you have a product that is already on the market
and you want to bolster its security,
our team offers you a 4-step service:

ANALYSE
Define the right level
of security required
EVALUATE
Know the robustness
of your product or its solution
SECURE
Adjust your product to the desired level of security
MONITOR
Guarantee its non-vulnerability
over time

Analyse
Identify the risks that are threats
Define the right level of security

RISK ANALYSIS
Detect critical processes,
potential vulnerabilities and threats, their probability of occurrence.
RISK MATRIX
Propose a classification of risks according to their impact
(human, financial, etc.) and probability.
Evaluate
Know the robustness of your
solution
Assess the security level according
to international criteria and standards.
PRE-DIAGNOSTIC
Analyse the overall solution architecture: hardware, software, wireless
communication, mobile, cloud.
DETECT AND IDENTIFY VULNERABILITIES
Test the robustness of your product, assess the security level (OWASP ASVS), ensure GDPR compliance.

Test
EVALUATE THE SECURITY OF YOUR CONNECTED OBJECT

Standard tests targeting specific vulnerabilities.The test is not comprehensive but ensures that the most common vulnerabilities are covered.
In-depth vulnerability search. Objective: hack the product.
According toyour customer needs.
Secure
Adjust your product to the right level of security
RECOMMENDATIONS
Definition of corrections to implement in terms of the risk level.
Support for hardware, firmware and software teams, from
development to deployment: management, reviews, tests, etc.
DEPLOYMENT
Support and implementation of patches
Monitor
Guarantee security over time
SEPCIFIC INTELLIGENCE
The last identified vulnerabilities affecting your architecture.
Generate alerts
Annual report
TRAINING
Tailor-made fundamentals:
training tailored to your needs,
from hardware to the cloud.

Rtone in the Paclido project
Because Rtone is committed to security
OBJECTIVES
- Develop lightweight encryption algorithms and protocols for IoT
- Develop a detection system for attacks targeting IoT
- Uses in home automation, smart city, industry 4.0
- Algorithms submitted at the end of 2018 to the NIST LWC standardisation competition
- Deployment planned for public lighting in Saint Quentin en Yvelines in late 2020
LightweightCryptographic Protocols and Algorithms forthe Internet of Things
With the support of
Stay up to date
RTONE-SECURITY NEWSLETTER
The latest attacks listed.
The last identified vulnerabilities.
SECURITY INFO BLOG
The latest information.
Upcoming events.
Everything you need to know about standardisation