Login   |   1.866.392.4897 |   sales@timesys.com English Japanese German French Korean Chinese (Simplified) Chinese (Traditional)

Internet of Things (IoT)

Secure, Rich IoT and Intelligent
Edge Devices

Start the Conversation

How do you leverage best practices for designing, developing, securing and maintaining your IoT and edge devices?
How do you accelerate time-to-market for embedded system software?
How do you optimize every stage of your IoT software development lifecycle?

Engineering Expertise for Your Rich IoT and Intelligent Edge Devices

We leverage our expertise in real-time embedded software, along with RTLinux, RTOSes, drivers, firmware, and connectivity to deliver connected applications for IoT solutions.

Our experience extends across embedded systems for industrial automation, home automation, commercial building control, wearables, consumer products, transportation and medical devices.

Meet industry standards

Simplify meeting cybersecurity standards, regulations and industry guidelines including NIST 8259 Foundational Cybersecurity
Activities for IoT Device Manufacturers & 8259A IoT Device Cybersecurity Capability Core Baseline and ETSI EN 303 645 — Cyber Security for Consumer Internet of Things: Baseline Requirements

Timesys Cybersecurity Solutions for Industrial Control Systems enable you to simplify meeting IIoT & industrial cybersecurity standards
Timesys VigiShield Secure by Design services

Design security into your product

Secure By Design solution integrating best practice security features

Monitor and remediate CVEs

Unique SCA features, optimized for embedded systems, providing more accurate and streamlined vulnerability (CVE) management and long term maintenance

Timesys Vigiles Vulnerability Monitoring and Management
Timesys Software Engineering Services and Consulting

Collaborate with embedded experts

Timesys’ embedded system Software Engineering Services enable rapid development of secure, Rich IoT and Intelligent
Edge Devices

Our experience extends across embedded systems for industrial automation, home automation, commercial building control, wearables, consumer products, transportation and medical devices.

Our IoT development, connectivity enablement and cloud integration expertise includes:

  • In-board peripherals including i2c, SPI, one-wire, and many others
  • LCD and Keypad interfaces
  • Motion control and digital signal processing
  • M2M communication including WiFi, Zigbee, 5G, Bluetooth, Ethernet, RS485, and others
  • Telematics, GPS integration
  • Power-saving modes
  • Multicore communication (RToS and embedded Linux)
  • Device security including update service, secure boot, and verified boot
  • Cross Platform Mobile applications developed with Xamarin
  • Mobile to embedded device integration
  • Cloud Integration with AWS and Azure SDKs
  • Remote access, device management and OTA

Streamline and Simplify Compliance With Cybersecurity Standards, Regulations, and Industry Guidelines

NIST 8259 Foundational Cybersecurity
Activities for IoT Device Manufacturers
&
8259A IoT Device Cybersecurity Capability Core Baseline

Recommendations manufacturers should consider performing before their IoT devices are sold to customers and core IoT device cybersecurity functionality including:

  • Device identification
  • Device configuration
  • Data Protection
  • Logical access to interfaces
  • Software update
  • Cybersecurity state awareness

ETSI EN 303 645 — Cyber Security for Consumer Internet of Things: Baseline Requirements

Development and manufacturing guidance for securing consumer IoT products including:

  • No universal default passwords
  • Implement a means to manage reports of vulnerabilities
  • Keep software updated
  • Securely store sensitive security parameters
  • Communicate securely
  • Minimize exposed attack surface
  • Ensure software integrity
  • Ensure that personal data is secure
  • Make system resilient to outages
  • Examine system telemetry data
  • Make it easy for users to delete user data

Secure By Design

Vigishield Secure By Design Services

Security services to accelerate and simplify your implementation of:

  • Secure boot and chain of trust
  • Encrypted storage
  • Secure firmware updates
  • Device security hardening: Bootloader, kernel and user space
  • Protected hardware ports: JTAG, serial
  • Secure world/trusted software development (e.g.: OP-TEE software)
  • Tamper protection
  • Key and certificate management
  • Industry security standard compliance

Stay Secure

Vigiles Vulnerability Management Solution

Software-as-a-service toolset developed by Timesys to provide:

  • Automatic generation of an accurate Software Bill of Materials (SBOM) for industrial control, automation and IIoT devices running embedded Linux
  • Accurate vulnerability detection with SBOM filtering
  • Integration with Yocto, Buildroot, Timesys Factory build systems
  • Accurate, curated meta-data on software components for higher rates of vulnerability identification and accuracy, with fewer false positives
  • Streamlined remediation of vulnerabilities with efficient collaboration

Linux OS and BSP Maintenance

Our turnkey BSP Lifecycle Maintenance Service bringing our team of embedded system software experts to manage all aspects of maintaining the OS of your embedded Linux BSPs. We take care of:

  • Monitoring and applying updates and patches, validating changes and providing you with reports on status
  • Maintaining the strongest security posture throughout device deployment
  • Providing you with ready-to-deploy platform updates

How Timesys has helped customers successfully bring IoT products to market faster, with higher quality, richer feature sets, and with stronger security

Consumer / IoT

Board bring up, Yocto customization and camera for Consumer / IoT

A leading manufacturer of consumer appliances needed help developing a next-gen smart home appliance featuring a TI Sitara based custom board with camera connected with Amazon AWS Cloud. See how Timesys worked as an extension of their team to support the requirements definition, software architecture risk reduction, and software implementation of their next-gen product.

Read the Case Study

HAVE A PROJECT YOU’D LIKE TO DISCUSS?

Start the Conversation

Stop worrying about how you are going to find the engineering time and in-house expertise to give your product the professional architecture and security attention it needs.