We will get back to you as soon as possible. Meanwhile, check out Our Thinking page for more cyber security insights.Check out more cyber security insights
Whether you’re engineering and launching a new product or purchasing a critical product, the security decisions you make influence the safety and security of your employees, customers, and business.
Our Product Security team was founded as Inverse Path in 2005. We now provide advanced technical consultancy to some of the world’s most challenging and critical industries, including automotive, electronics, and semiconductor manufacturing, industrial control systems, maritime, and aviation. For over a decade, our capabilities have been trusted to secure standard and fully bespoke products including low-level electronics, hardware devices, firmware, operating systems, software applications, fully integrated cyber-physical systems (CPS), and more.
Our consultancy is specialist and outcome focused. Organizations choose us as a partner to collaboratively build and test the security of their products, because we’re practitioners ourselves; we develop our own products, build our own custom hardware and software testing suites, and deliver original technical research.
Our work in product security has helped defend the lives of millions, ensured the safety of vehicles, improved the resilience of critical infrastructure and the integrity of electronic components, and protected corporate trade secrets and intellectual property.
Product Security Review
Analyze the security of hardware and software products in-depth, beyond the capability of a penetration test or vulnerability assessment. Product Security Reviews provide partial, aspect-specific reviews of a device (e.g., applications or device firmware), up to full-device reviews of integrated systems, including hardware components.
Product Security Advisory services
Assess the risk profile of your products through technical risk assessments, threat modelling, design reviews, and secure design consulting. Our Product Security Advisory offers different approaches to help you understand where your products expose users and how to make them resilient by design.
Our aptitude for complex hardware and software security is the result of a senior team with varied and well-practiced skills, unique domain knowledge, and a deep involvement in the open-source hardware and software community.