F-Secure Foundry

We live in a physical as well as digital world. Secure your hardware from conception to completion with world-class testing, engineering, and implementation.


We design hardware with built-in security, from industrial data loggers to personal cryptocurrency wallets.


We engineer hardened bootloaders, secure monitors, and runtime environments with minimal attack surface.


We develop embedded applications for numerous industries and functions, combining our engineering and hacking skills.

Secure boot

We are the leading world experts in Secure Boot implementations. We broke several, trust us in securing them.


We secure critical equipment on aircraft, automotive vehicles, marine vessels, and satellites – where security is critical to human safety.

Open source

We ensure close ties with the industry and a test-heavy approach by leading open hardware and open source projects.

USB armory

The worlds smallest secure, open-source-driven computer.

Security, embedded right from the beginning

We are breakers and makers, testing and building software and hardware products from the ground up since 2005. This has given us a pragmatic engineering mindset that makes those products not only effective and secure, but practical to implement in your organization. Our hardware security services have been awared with IEC 62443 certification. Find out more in our detailed service overview.

Our approach



Understand and select the right features offered by application processors to achieve secure product design.

  • There are no remote hardware upgrades - we make sure that correct and secure components are there from the start
  • We plan ahead to contain breaches with built-in isolation, data diodes, and separation of roles
  • Hardware, firmware, software: orchestrated design for every layer of your architecture
  • Built-in risk assessment and threat analysis


Take secure products from the drawing board to deployment.

  • Orchestrated hardware, firmware, and software development
  • Development with a cyber-secure mindset, trained in breaking code, and defending it
  • Research-driven, production-grade focused – what we gather in technical insight we apply in the real-world


Secure products are manageable, maintainable, and verifiable. Our delivery process ensures control stays in your hands, with full code transparency, simple-to-interpret documentation, and tested deployments.

  • Mission-critical solutions delivered to the strictest production-grade standards
  • Full source code delivery
  • Integration workshops and training


We’re here for the long-haul, giving you products that are manageable and maintainable in the short, medium and long term, by you.

  • IEC-62443-4-1 certified secure development lifecycle
  • Incident response and vulnerability remediation
  • Vulnerability disclosure coordination
  • Feature enhancement and continuous security support

Case studies

Cryptocurrency wallets

We’ve engineered innovative escrow solutions for cryptocurrency exchanges and individual wallets, based on our USB armory platform or custom developed hardware. Our solutions offer the highest number of modern transactional features, with a significantly-reduced attack surface.

Secure data logging

We’ve developed custom IEC-62443 certified data logging solutions for remote deployment. Designed for use in the maritime, aviation, and automotive industries, our secure data loggers collect information from vessels, aircraft, and vehicles, with local and remote secure storage. Advanced data diode concepts isolates attacks aimed at accessing industrial buses: even in worst-case scenarios, the solution prevents attackers from using it to gain control over safety-critical systems.

Intellectual property protection

We’ve engineered custom IP protection schemes for firmware and software, integrating hardware-backed trust chains with effective runtime protection. The outcome is integrated products, locked-down, making sure the cost of compromise of any residual risk far outweighs the value of the internal IP and data.

USB armory

We’re the engineers of USB armory: the tiny but powerful secure computer for personal and enterprise applications. We integrate and develop hardware security modules, licensing tokens, secure provisioning platforms, and many applications that work with USB armory. Available with custom variants for every need.

ARM® TrustZone®

We’re experienced in evaluating, designing, and training for effective and secure TrustZone implementations – tasks that require a deep understanding of inner hardware layout. When expertly handled, TrustZone technology can result in considerable production savings by reducing part number count. When TrustZone consulting is carried out early on in any process, costly mistakes are avoided.

Data diodes

Proper segregation of safety-sensitive domains relies on robust layers of separation. Where interconnection is inevitable, data diodes can be used to create unidirectional flow, forbidding communication from less secure domains towards more privileged ones. Our experience implementing data diodes extends to household-name enterprises in the travel sector, where we’ve delivered state-of-the-art solutions focused on human safety.

Research projects

Accreditations & Certificates

F-Secure Consulting (F-Secure Cyber Security (Pty) Ltd) is a level 4 contributor to B-BBEE with a procurement recognition level of 100%. Learn more and download our B-BBEE certificate. Click here to read the press release.

Follow us
@fsecure_consult F-Secure-Consulting f-secure-foundry fsecurelabs