Cyber-Secure Software Development and Testing
BG Networks offers both security assessment and software development services because they are complementary and will result in the most efficient implementation of your security needs. After we have assisted in developing the cybersecurity requirements for your IoT product, we will have the knowledge to take the next step and implement the required security features.
We have a focus on the building blocks of IoT security which include a root of trust, secure boot, Over-The-Air (OTA) updates, secure data, secure passwords, and secure communications. These features are candidates for the set of minimum requirements called for in the new federal IoT cybersecurity law. To understand how this law impacts IoT manufacturers, see our blog The IoT Cybersecurity Act of 2020: The 9 Key Points Explained.
We’ll implement the building blocks of cybersecurity while taking advantage of the security features built into the microprocessor hardware. This results in the most secure and efficient designs.
BG Networks provides IoT security from the lowers layers of the software stack including the driver, RTOS, Linux, and middleware levels. These are the levels where cyber security for IoT devices begin and where the building blocks of cyber security are implemented. As needed, we can make these lower layer security resources accessible to your software programmers working on higher levels, such as an edge to cloud software stack. Many edge to cloud platforms leaves it to the user to implement these layers of security.
We have experience with many processor architectures and the ability to quickly develop software for new processors while leveraging all the security features they have.