MathEmbedded is now offering a low-cost cyber security health check for your embedded product or IoT system!
Are you worried about the potential high-profilelegal, financial and reputation/brand damage implications of a cyber security attack against your product or IoT system?
Unsure if your connected embedded product or IoT system is secure?
Want to understand more about the privacy implications of your product or system?
Do you have the appropriate secure development practises and processes in place to minimize risk to your organization and management?
How can we help you?
MathEmbedded offers a fast, cost-effective, fixed-price cyber security assurance reviewfor your embedded productor IoT system that will provide you with easy to understand information on your current security position.
Management can use this to understand your current level of risk and help decide what further action (if any) you may need to take to prevent damage.
How does it work?
The review consists of a simple questionnaire to fill in along with a 1 day, confidential, on-site visit to your company to talk to your management and engineering team. You will then receive a clear report of our findings and recommendations along with a risk and impact table of the highest priority issues.
From the questionnaire and what we learn at the on-site review, we will perform a comprehensive high-level 50 point checklist-driven review to identify the potential problem areas and to give you a good baseline of your current cyber security position. The checklist covers a wide range of functions that impact your overall cyber-security including:
A leading supplier of embedded security and specialist development services
MathEmbedded is a privately owned, independent embedded softwarecyber security and specialist software development service provider. We are a UK Limited company but operate globally with sales offices in the UK and US.
We employ experienced low-level software engineers who are experts at specifying, analysing, designing, architecting, reviewing and writing firmware, bootloader, operating system, driver and application level code and who also have a deep understanding of software security. We often work at the hardware/software boundary and know how to interface with silicon-level features such as security and video and audio offload engines.
We employ experienced software security consultants who are experts at end-to-end security specification, design, architecture and review of complex systems.
Finally, we have a number of consultants who help companies understand and introduce security into their organisations and development processes and projects by providing training and bespoke consultancy services.
We support our clients in a number of ways:
We consult on embedded software and security specification,design, architecture and implementation
We develop complex software at all levels from security firmware to Android applications
We systematically review products and systems to identify and fix security problems
We act as independent security reviewers for projects
We train companies to understand security, implement secure software development processes and security harden embedded systems based on Linux, Android or QNX
We can work either independently or in co-operation with your existing teams to build up their skills and experience.
We work with companies of all sizes and stages from new start-ups to well-known, mature global brands.