Because a product cannot be developedwithout considering security,our dedicated team strives to deliverthe most secure version of your product as possible.
Security by design
WE CONSIDER THE SECURITY ASPECT RIGHT FROM THE PRODUCT
OUR TEAM KNOWS THE MISTAKES TO AVOID AND THE PRINCIPLES TO ADOPT TO PREVENT FLAWS IN THE FUTURE.
If you have a product that is already on the market
and you want to bolster its security,
our team offers you a 4-step service:
Define the right level
of security required
Know the robustness
of your product or its solution
Adjust your product to the desired level of security
Guarantee its non-vulnerability
Identify the risks that are threats
Define the right level of security
Detect critical processes,
potential vulnerabilities and threats, their probability of occurrence.
Propose a classification of risks according to their impact
(human, financial, etc.) and probability.
Know the robustness of your
Assess the security level according
to international criteria and standards.
Analyse the overall solution architecture: hardware, software, wireless
communication, mobile, cloud.
DETECT AND IDENTIFY VULNERABILITIES
Test the robustness of your product, assess the security level (OWASP ASVS), ensure GDPR compliance.
EVALUATE THE SECURITY OF YOUR CONNECTED OBJECT
Standard tests targeting specific vulnerabilities.The test is not comprehensive but ensures that the most common vulnerabilities are covered.
In-depth vulnerability search. Objective: hack the product.
According toyour customer needs.
Adjust your product to the right level of security
Definition of corrections to implement in terms of the risk level.
Support for hardware, firmware and software teams, from
development to deployment: management, reviews, tests, etc.
Support and implementation of patches
Guarantee security over time
The last identified vulnerabilities affecting your architecture.
training tailored to your needs,
from hardware to the cloud.
Rtone in the Paclido project
Because Rtone is committed to security
- Develop lightweight encryption algorithms and protocols for IoT
- Develop a detection system for attacks targeting IoT
- Uses in home automation, smart city, industry 4.0
- Algorithms submitted at the end of 2018 to the NIST LWC standardisation competition
- Deployment planned for public lighting in Saint Quentin en Yvelines in late 2020
Stay up to date
The latest attacks listed.
The last identified vulnerabilities.
SECURITY INFO BLOG
The latest information.
Everything you need to know about standardisation