
Impact

Protecting data
Data can be immensely valuable, to both businesses and consumers. But, as with anything of value, data may also be exploited by others – for financial gain, for ideological reasons or simply out of malice. The ubiquity of connected systems makes protection especially difficult, given the prevalence of hacking tools and digital crime.
We ensure data confidentiality and integrity, protect intellectual property and maximise system availability, through technology consultancy, concept development or as part of a wider product and system design.
Managing digital security risks

Vulnerability analysis
Equally applicable to new and existing systems, our vulnerability analysis process builds on international standards to reflect our real-world experience of third party motivations and how attacks are shared.
Our proprietary risk assessment tools help identify assets and the effects of compromise; understand potential attackers, their motivations and resources; and assess the practicality, impact and likelihood of vulnerabilities. We then define system security requirements to directly mitigate these risks as part of an integrated design.

Secure by design
Robust system design ensures digital security solutions are properly implemented. Our formal design processes ensure system security by addressing a product’s risks and vulnerabilities as-designed, as-implemented and as-used.
This involves defining security requirements and setting the overall strategy; defining security architecture and system design; and testing to verify regulatory and legal compliance.
For medical systems, this includes Health Insurance Portability and Accountability Act (HIPAA) and Good Automated Manufacturing Practice (GAMP) standards.
Experience

Anti-counterfeit measures
We deploy the latest technologies in anti-counterfeit and brand protection, to provide a thorough analysis of our clients’ products and systems.
On the development side, we routinely embed anti-counterfeit features within both consumer products and medical devices. Elsewhere, our statistical algorithm capability has developed covert watermark technology for high-value audio content and a patented anti-counterfeit digital coding scheme.
We also have substantial experience in the development of high performance anti-counterfeit feature readers and ‘track and trace’ systems.

Secure payment & authentication
Using our security, wireless and sensing expertise, we build secure payment and authentication features into many products and entire authentication systems. Leading the way with near field communication (NFC) technology, we’re helping our medical clients adopt it as a solution for product registration and authentication of consumables. As a registered MasterCard developer, we also design custom contactless payment solutions, such as that for the accesso smart wearable.

Embedded digital security & encryption
Having spent many decades at the forefront of digital security, we developed low-power, computationally efficient public key infrastructure (PKI) and AES encryption implementations for smart metering systems years before the advent of the Internet of Things (IoT).
Today, we’re pioneering the use of emerging technologies such as blockchain alongside established technologies such as identity management, secure boot, digital signatures and cloud encryption.
Tech, tools & facilities

Digital security codebase
We possess a software library of digital security IP that can be used in the implementation of systems for our clients. Having these established building blocks on hand results in lower cost, lower risk programmes. Among various encryption, authentication and blockchain libraries, our codebase includes one of the world’s lowest power AES implementations and a PKI for end-to-end. factory-to-brand owner systems.

Secure element toolchain
This toolchain gives us access to software and hardware from leading security vendors in EAL-certified ‘secure element’ silicon – the same technology that appears in your bank card, SIM card, and passport. This allows us to write, test and register software to implement mobile payment systems in our clients products. This facility is the result of our close relationships with key suppliers and test houses, access to datasheets and samples, and our registration with Mastercard as a contactless payment solution provider.
Case studies

News & insights

양자 컴퓨팅 – 이제 우리는 디지털 안보 위협에 대비해야 합니다.
양자 컴퓨팅은 혁신 그 자체 입니다. 양자 컴퓨팅은 생경하지만 놀라운 물리학, 수학, 컴퓨터 과학의 조합으로서, 이 조합이 가진 특별한 잠재력을 보고 전세계 투자금이 양자 컴퓨팅으로 몰리고 있습니다.
- 머신 러닝 & AI
- 커넥트비티 & 사물인터넷(IoT)
- 디지털 보안

감지 강화를 위한 양자 제어
가스 감지 기술은 이미 고도로 발달되어 있습니다. 이보다 더 향상될 수 있을까요?
- 머신 러닝 & AI
- 커넥트비티 & 사물인터넷(IoT)
- 디지털 보안
- 광학
- 로봇 공학
- 센서

양자(Quantum)혁명은 아직 시작되지 않았는가?
몬티 발로우(Montry Barlow) 전략 기술 팀장이 영국 본사에서 열린 이노베이션 데이(Innovation Day UK)에서 리차드 레이랜드(Richard Leyland)와 캠브리지 컨설턴트의 양자(quantum)기술 관련 활동에 대해 이야기를 나눴습니다. 몬티 팀장은 끊임없이 발전하고 있는 양자 툴박스의 진화 양상과, 양자 혁명이 가장 먼저 일어나게 될 특정 분야에 대해 설명하였습니다.
- 머신 러닝 & AI
- 커넥트비티 & 사물인터넷(IoT)
- 디지털 보안
- 광학
- 센서