DEVICES SECURE FROM WITHIN

External threats used to be fought from the outside. Today, Exein changes this paradigm by moving security within the device where the full logic of business lies.

ALL FIRMWARE TYPES

Firmware comes in various shapes and technology—there is no one size fits all. Exein comes in as many forms as firmware and provides support for any of them, past or present.

SELF-MONITORING

Self-monitoring enables continual business on the device, even without a connection.

CUSTOMIZED

Exein solutions are customized and self-assembled for any specific device.

For IoT Developers

An SDK to develop secure firmware for IoT

The Exein SDK allows producers to build already secure firmware by integrating self-monitoring technologies. These features allow the device to protect itself against known and unknown threats. SDK is available as a plug-in, e.g.Yocto or Buildroot.

FOR IOT CUSTOMERS

Retrofit features on already existing firmware

Exein revives the already existing device whose firmware is either no longer maintained by their producers or too expensive for them to fix. This happens by providing through design the logic needed for surviving in an increasingly hostile world full of threats.

FOR IOT SCIENTISTS

RUN-TIME ANOMALY DETECTION AND INTEGRITY CHECKING

Machine learning-based advanced technology profiles system behavior at the hardware abstraction level. This allows for improper or malicious behavior to be detected in real-time. Such technology also ensures that the firmware does not change while running so that only the intended code is executed, thus preventing any malicious activity.

FOR IOT VENDORS

Secure boot

Secure Boot eliminates the weakest point of every central processing unit (CPU). Exein technology permits mutual authentication between the application and the bootloader code.

NETWORK FINGERPRINT OBFUSCATION

Sun Tzu taught us to know our enemy. Exein’s obfuscation aims to confuse the enemy. Randomizing the hardware fingerprint for unauthorized network crawlers and scanners prevents the occasional bad guy from making a move.

View documentation

Security is learned not programmed

A technology that lets devices learn what’s right and what’s wrong providing protection from known and unknown threats.

View documentation
  • Storage metrics
  • Communication usage
  • Memory usage
  • CPU metrics
  • Embedded Threat intelligence compatible with major SIEMs