Impact


Protecting data

Data can be immensely valuable, to both businesses and consumers. But, as with anything of value, data may also be exploited by others – for financial gain, for ideological reasons or simply out of malice. The ubiquity of connected systems makes protection especially difficult, given the prevalence of hacking tools and digital crime.

We ensure data confidentiality and integrity, protect intellectual property and maximise system availability, through technology consultancy, concept development or as part of a wider product and system design.

Managing digital security risks



Compliance
Legal and regulatory compliance concerning data security and privacy is critical, particularly in regulated industries. We work with our clients to ensure compliance with the UK Data Protection Act, EU General Data Protection Regulation and international cybersecurity regulations governing medical devices.
Brand reputation
Damage to brand reputation following a compromise or loss of consumer data, whether actual or perceived, can be devastating. We develop robust digital security systems to safeguard consumer confidence and trust.
User experience
“Always-on” consumer expectations demand a consistent and robust yet responsive user experience. We create transparent security protocols that protect the user experience and the underlying data, regardless of the system architecture, connectivity or data location.

Vulnerability analysis

Equally applicable to new and existing systems, our vulnerability analysis process builds on international standards to reflect our real-world experience of third party motivations and how attacks are shared.

Our proprietary risk assessment tools help identify assets and the effects of compromise; understand potential attackers, their motivations and resources; and assess the practicality, impact and likelihood of vulnerabilities. We then define system security requirements to directly mitigate these risks as part of an integrated design. 

Secure by design

Robust system design ensures digital security solutions are properly implemented. Our formal design processes ensure system security by addressing a product’s risks and vulnerabilities as-designed, as-implemented and as-used.

This involves defining security requirements and setting the overall strategy; defining security architecture and system design; and testing to verify regulatory and legal compliance.

For medical systems, this includes Health Insurance Portability and Accountability Act (HIPAA) and Good Automated Manufacturing Practice (GAMP) standards. 

Experience


Anti-counterfeit measures

We deploy the latest technologies in anti-counterfeit and brand protection, to provide a thorough analysis of our clients’ products and systems.

On the development side, we routinely embed anti-counterfeit features within both consumer products and medical devices. Elsewhere, our statistical algorithm capability has developed covert watermark technology for high-value audio content and a patented anti-counterfeit digital coding scheme.

We also have substantial experience in the development of high performance anti-counterfeit feature readers and ‘track and trace’ systems. 

Secure payment & authentication

Using our security,  wireless and sensing expertise, we build secure payment and authentication features into many products and entire authentication systems. Leading the way with near field communication (NFC) technology, we’re helping our medical clients adopt it as a solution for product registration and authentication of consumables. As a registered MasterCard developer, we also design custom contactless payment solutions, such as that for the accesso smart wearable

Embedded digital security & encryption

Having spent many decades at the forefront of digital security, we developed low-power, computationally efficient public key infrastructure (PKI) and AES encryption implementations for smart metering systems years before the advent of the Internet of Things (IoT).

Today, we’re pioneering the use of emerging technologies such as blockchain alongside established technologies such as identity management, secure boot, digital signatures and cloud encryption. 

Interested in joining us? 

Tech, tools & facilities


Digital security codebase
 

Digital security codebase

We possess a software library of digital security IP that can be used in the implementation of systems for our clients. Having these established building blocks on hand results in lower cost, lower risk programmes. Among various encryption, authentication and blockchain libraries, our codebase includes one of the world’s lowest power AES implementations and a PKI for end-to-end. factory-to-brand owner systems.

Secure-element-toolchain
 

Secure element toolchain

This toolchain gives us access to software and hardware from leading security vendors in EAL-certified ‘secure element’ silicon – the same technology that appears in your bank card, SIM card, and passport. This allows us to write, test and register software to implement mobile payment systems in our clients products. This facility is the result of our close relationships with key suppliers and test houses, access to datasheets and samples, and our registration with Mastercard as a contactless payment solution provider.

Case studies


 

Iridium Extreme satellite phone

The first truly global ‘Push-To-Talk’ mobile communications system, Iridium Extreme PTT has provided the low-earth orbit leader with a valuable new revenue stream.

 

Ocado smart platform

Transforming warehouse automation with another world-first in radio design

 

Smart gas meter

Using a fresh approach, we designed an energy efficient, future proof unit smart gas meter for one of Europe’s largest engineering companies, optimised for mass manufacture and ease of installation.

News & insights


Whitepaper

The future of patient monitoring

1st July 2019

Patient monitoring is an inherent part of patient management. Intermittent and continuous measurements have a range of uses, from defining disease states and characterising progression to informing therapeutic approaches and...

  • AI & Analytics
  • Connectivity & IoT
  • Digital health
  • Digital security
  • Digital services
  • Human factors
  • Product realisation
  • Sensing
  • Service design
  • User Experience (UX)
Opinion

Clever ‘smart beds’ strategy means thinking beyond the outmoded hospital ward

20th August 2019

With patients spending less time in hospital and more time at home or in long-term care establishments, the future is bright for medical bed manufacturers able to deliver the innovative solutions that are needed to successfully reshape healthcare delivery.

  • AI & Analytics
  • Digital health
  • Digital security
Opinion

Blockchains: how to take advantage of crypto chains without being hostage to speculation and crypto kittens

19th December 2017

Forget about Pokémon Go. That is so 2016. The latest craze is CryptoKitties – a “crypto-pet” breeding and trading game built on the Ethereum blockchain. Its players have so far spent over 15 million...

  • Connectivity & IoT
  • Digital security
  • Radio systems
Opinion

IoT security risks are real but will not stop its growth

19th July 2017

In 1981 the first mass outbreak of a computer virus, the Elk Cloner, took place, infecting Apple II computers via floppy disks. Even though it relied on the manual sharing of disks to replicate...

  • Connectivity & IoT
  • Digital security

Events


SpeakerSponsor

Digital Security is not just a technical issue; it's a business issue

21st Nov 2019
CIC Cambridge, 245 Main St. Mosaic Room, Floor 3, Cambridge, MA 02142

An effective digital security strategy considers both technical and business impact. In this session our digital security experts will explain key considerations for an effective strategy through real-world examples.

Speaker

50th EPRA Meeting

-
Royal Olympic Hotel, Greece, Athens

The European Platform of Regulatory Authorities (EPRA) is the oldest and largest network of broadcasting regulators.

The 50th EPRA meeting provides an open platform for discussions on a wide variety of relevant topics to regulators, including protecting internet users from harmful content.

Event

Connected Britain 2018

-
Business Design Centre, London, UK

Connected Britain is the premier meeting place for all the main stakeholders to come together and discuss, learn and collaborate on the UK’s digital future.

We can help you achieve the impossible