Impact

It is our belief that security is not just a problem to be dealt with. It is actually a commercial asset – the right security solutions can be a springboard to business growth.

The business differentiator

Security can become a business differentiator by using the latest technology to engender customer trust and loyalty in your product and connected services. We enable innovative business models by providing data processing solutions that use novel techniques to maintain confidentiality. And we use explainable security concepts so that your customers can understand and appreciate the benefits.

Our expertise has been applied widely: to create wearables enabling new customer experiences; to empower new vehicle fleet management business models; and to allow pharmaceutical products to be authenticated in front of the consumer, so gaining their trust. Untold possibilities remain.

Redefining what’s possible

We deliver novel security solutions to meet evolving needs and emerging threats. That means applying the latest thinking from academia and other technology leaders. To stay ahead of game, we invest to build our understanding and to develop new initiatives. Recent examples include:

• Testing continuous variable quantum key distribution (QKD)
•  Applying AI to computer log and other analysis
•  Exploring homomorphic encryption
•  Developing solutions to meet the quantum compute challenge

Solutions in complexity

With connectivity comes complexity. Just consider the complexity needed to enable a smart city or autonomous vehicle. Rising to the challenge of architecting the security of these system-of-systems is something we relish.

Managing complexity

Our role is to solve the security challenges that are critical to ensure the continual and safe operation of your businesses. The advice we give is based upon a 20-year heritage of understanding precisely what security technology can achieve. This ensures that the right investment decisions are made to reduce security risk.

What industries do we support? We work across a wide range of operational systems to ensure the security of smart Infrastructure, automotive, defence, industrial automation and wider IoT enabled businesses. 

Securing the edge

The devices at the edge of our networks are often the most vulnerable part of any system.

Where power and cost are at a premium 

Our expertise enables you to disrupt your market by developing the most secure device, even when the power budget is incredibly low, and the cost must be measured in cents rather than dollars.

We’ve achieved this, and more, in many applications: 

• Smart meters using secure credit card technology to keep power demands to a minimum
• Mobile medical equipment that enables wireless communication via Wi-Fi and 4G
• Vehicle telematics operating for one year on a coin cell
• The world’s lowest power contactless payment on a wearable device with a screen

Secure by design

Robust system design ensures digital security solutions are properly implemented. Our formal design processes ensure system security by addressing a product’s risks and vulnerabilities as designed, as implemented and as used.

This involves defining security requirements and setting the overall strategy; defining security architecture and system design; and testing to verify regulatory and legal compliance.

For medical systems, this includes the Health Insurance Portability and Accountability Act (HIPAA) and Good Automated Manufacturing Practice (GAMP) standards. 

Due diligence

Investors recognise that the market for security solutions continues to grow in double digits each year. New ideas flood the market, but only some will stick and provide the real return on investment.

Our due diligence advice for investors is based on a deep understanding of technology and the threat landscape. We look to the future and root our market advice in society and industry trends. Because we understand how the security market will need to evolve to meet these trends, we know which investments are likely to see the best returns. 

Authentication and brand protection

Deployment of the latest technologies in anti-counterfeit and brand protection contributes solutions that ensure your customers can be confident that your products are your products. This robust approach is applied widely, including new ways to test authenticity at the point of sale, and even to laboratory standards.

We embed anti-counterfeit features within both consumer products  and medical devices . Elsewhere, our statistical algorithm capability has developed covert watermark technology for high-value audio content and a patented anti-counterfeit digital coding scheme.

Talk to us about securing your solutions

Meet our experts

Thumbnail
Head of Digital Security
Thumbnail
Commercial & Due Diligence Lead
Thumbnail
Industry & Transport Security Lead
Thumbnail
Medical Security Lead
Thumbnail
Head of Digital Service Innovation
Thumbnail
Connectivity Security Lead

Tech, tools & facilities

Digital security codebase

Digital security codebase

We possess a software library of digital security IP that can be used in the implementation of systems for our clients. Having these established building blocks on hand results in lower cost, lower risk programmes. Among various encryption, authentication and blockchain libraries, our codebase includes one of the world’s lowest power AES implementations and a PKI for end-to-end. factory-to-brand owner systems.

Secure-element-toolchain

Secure element toolchain

This toolchain gives us access to software and hardware from leading security vendors in EAL-certified ‘secure element’ silicon – the same technology that appears in your bank card, SIM card, and passport. This allows us to write, test and register software to implement mobile payment systems in our clients products. This facility is the result of our close relationships with key suppliers and test houses, access to datasheets and samples, and our registration with Mastercard as a contactless payment solution provider.

AI infrastructure datalab

AI infrastructure

Our onsite compute infrastructure allows us to explore options, train and test models more rapidly and get better results.

 

We run petaflop-scale, containerised compute on site, with multiple NVIDIA DGX-1 Deep Learning Supercomputers and other GPU and FPGA-accelerated servers. This links to petabyte-scale local NetApp storage, project-specific cloud and our continuous integration systems.

Prototyping workshops

Prototyping workshops

Our electronic and mechanical prototyping workshops allow us to produce technically credible prototypes that bring ideas to life and offer a powerful demonstration of their value. All while maintaining extremely high standards of quality that conform to ISO 9001, ISO 13485 and ISO 14001 regulations. Using the latest CNC and milling machines, lathes, welding gear and wire harness and cable assembly tools, we are able to produce parts very quickly and assemble full-scale working prototypes for testing and consumer trials.

Case studies

Wireless breakthrough for the Ocado Smart Platform

A world-first in radio design helps transform online grocery across the globe

ListenTALK advanced Group Communication System

ListenTALK advanced Group Communication System

Iridium Extreme satellite phone

The first truly global ‘Push-To-Talk’ mobile communications system

accesso smart wearable

For their latest wearable device, accesso wanted to take their LoQueue virtual queuing solution to the next level, adding greater interactivity and creating new ways to connect with park guests during their visit.

News & insights

Whitepaper

The future of patient monitoring

1st Jul 2019

Patient monitoring is an inherent part of patient management. Intermittent and continuous measurements have a range of uses, from defining disease states and characterising progression to informing therapeutic approaches and...

  • AI & Analytics
  • Connectivity & IoT
  • Digital health
  • Digital security
  • Digital service innovation
  • Human factors
  • Product realisation
  • Sensing
  • User Experience (UX)
web3 explained
Opinion

The main benefit of heeding Web 3? It will save your business from irrelevancy

8th Sep 2022

In my second article on Web3, I retain my digital services viewpoint, but provide a more nuanced overview by unpacking the potential benefits of Web3. It continues my take on what every member of the C-Suite needs to know about Web3.

  • Digital security
  • Digital service innovation
  • Strategic advice
Web3 explained
Opinion

Web3 explained: Why you should care about the blockbusting transformation that’s in development

6th Sep 2022

It’s been brewing for a while, but suddenly Web3 is on everyone’s lips. Web3 promises a democratised future free of big tech monopoly. But if you’re a member of the C-Suite, you might well be asking the key question: ‘Web3, why should I care?’

  • Digital security
  • Digital service innovation
  • Strategic advice
Uncrewed Aircraft
Webinar

Fostering technology advances that will accelerate adoption of uncrewed aircraft

13th Jul 2022

Uncrewed operations in Advanced Air Mobility promise significant rewards for ambitious innovators, but the question remains, how does the industry achieve the safety and value proposition standard necessary to accelerate public acceptance of autonomous aircraft to bring about commercial viability?

The answer lies in a host of technology advances. By attending this webinar, you will gain an understanding of the innovation taking place, and how collaboration across industries will create safer and more commercially successful autonomous operations.

  • AI & Analytics
  • Connectivity & IoT
  • Digital security

Events

utility private networks
Speaker

UBBA Summit & Plugfest 2022

10th Oct 2022 - 14th Oct 2022
The Westin South Coast Plaza, Costa Mesa, California

The Utility Broadband Alliance(UBBA) is a collaboration of utilities and ecosystem partners dedicated to championing the advancement and development of private broadband networks for America’s critical infrastructure industries.

UBBA's second annual Summit & Plugfest takes place in Costa Mesa, CA, this year, October 11-14, 2022. Utility executives, innovation leaders, suppliers and end users from across North America will gather to discuss what connectivity will mean for the future of utilities and the communities they serve.

Challenges in open data Japan_Summary
Panel discussionWebinar

Comparing the UK and Japan: Successes and Challenges in Open Data Utilisation

14th Jul 2022

Marking this exciting new chapter in trading relations between the UK and Japan, the Department for International Trade (DIT) and Smart City Institute Japan (SCI-J), the largest smart cities association in Japan, are hosting a webinar, inviting innovative UK technology companies to learn from the Open Data Institute (ODI) in the UK and NEC in Japan to compare the successes and challenges in open data utilisation.

Supernal CUAV
Webinar

Fostering technology advances that will accelerate adoption of uncrewed aircraft systems

13th Jul 2022
Virtual

Uncrewed operations in Advanced Air Mobility promise significant rewards for ambitious innovators, but the question remains, how does the industry achieve the safety and value proposition standard necessary to accelerate public acceptance of autonomous aircraft to bring about commercial viability? 

The answer lies in a host of technology advances. By attending this webinar, you will gain an understanding of the innovation taking place, and how collaboration across industries will create safer and more commercially successful autonomous operations.

An uncrewed passenger air taxi stands on the road waiting for a client
Panel discussionWebinar

The Pathway to Advanced Air Mobility (AAM)

1st Jun 2022
Virtual

We'll be joining industry experts in this panel session to discuss the steps needed to make Advanced Air Mobility (AAM) a reality. We'll be exploring topics such as requirements for ground and air infrastructure, costs, regulations, public acceptance and more.