Design the most secure version of your IoT product

IoT security must be central to the design of each product and every stage of your project.

securite objet connecte

Security by design

We incorporate the security aspect from the earliest product design stage

Smart object security at every stage of the IoT pathway

Analyse

Identify the risks that threaten your solution and define the appropriate security level.
Z

Evaluate

Find out how robust your product or solution is and detect any security vulnerabilities.

SECURE

Adjust your product to the desired level of security.

U

Monitor

Guarantee that your solution remains free from vulnerabilities over time.

Security priorities integrated into projects

Sterilor

for treating swimming pool water.

N

Analysis and proposal of a secure IoT architecture

N

Device control via a mobile app

N

Real-time data reporting

Sécurité IoT

Cybersecurity research work

Rtone can combine applied research with engineering to design a secure connected solution. We incorporate the latest advances in cybersecurity and privacy into every stage of the IoT pathway across all our activities.

Five stages in securing your smart product

Analysis

Risk analysis

Risk matrix

Evaluation

Preliminary diagnostic: hardware, software, wireless communication, mobile and cloud

Security level based on international standards (OWASP ASVS)

GDPR compliance

Penetration testing

Level 1: Standard tests targeting specific vulnerabilities.

Level 2: Hacking the product.

Deployment

Supporting the hardware, firmware and software teams

Complete approach: development, supervision, reviews, tests etc.

Monitoring

Specific: monitoring the latest vulnerabilities, generating alerts

IoT security training

Security at the heart of our work

Rtone, a contributor to the Paclido project, is committed to security

 

Our aims:

  • Develop lightweight encryption algorithms and protocols for IoT
  • Develop a detection system for attacks targeting IoT
  • Uses in home automation, smart city, industry 4.0
  • Algorithms submitted at the end of 2018 to the NIST LWC standardisation competition
  • Deployment planned for public lighting in Saint Quentin en Yvelines in late 2020
paclido
Lightweight
Cryptographic Protocols and Algorithms for
the Internet of Things

  twitter paclido.fr

 

With the support of 

region auvergne rhones alpes bpi

I have a smart object project

Countering security flaws in connected objects

Many people underestimate the risks of intrusion, hacking and ransomware.

And yet these risks can be prevented with simple actions:

  • Anticipation, based on the principle of Security by Design
  • Testing the security of your connected object

To find out more,
> Read the article (french)