Centrifuge IoT Security Platform for Companies

  • Ask Yourself...

    1.  Are your company's embedded firmware or Internet of Things (IoT) devices at risk for exploitation?
    2.  Does your team run source code through an analyzer to identify insecure coding practices?
    3.  Do you test final compiled binary firmware images just before you go to production?
    4.  Are you aware that compilers can introduce vulnerabilities into your production-line ready firmware images?

    If you answered no to just one question, then you, your product and your company may be open to unforeseen risks that may tarnish your name, your brand, your reputation and even your stock price.

  • Your One Important and Final Quality Assurance Check
    Does your company use and link to open source libraries in your firmware images? Do you know if the libraries themselves are secure?

    The Centrifuge IoT Security Platform quickly identifies vulnerabilities introduced by insecure coding practices, vulnerabilities introduced by the compilation process itself and links to flawed open source libraries - with NO source code needed!

    It operates by:

    1. Performing automated reverse engineering of compiled firmware images
    2. Extracting the complete root filesystems within the firmware image
    3. Deconstructing each file down to the byte code level
    4. Generating detailed reports revealing vulnerable functions calls

    It's your roadmap to vulnerability discovery just before you go to production. It's the final step in your firmware development lifecycle process.

    Validate Your Suppliers
    Does your company rely on vendor-provided firmware for integration into your products? Do you know if your supplier's firmware image is free from vulnerabilities that could -- once integrated into your final product -- expose you to attack and embarrassment?

    The Centrifuge IoT Security Platform requires only a compiled firmware image with a Linux-based filesystem. It does not need nor require access to source code!

    Rapidly Perform Exploit Development

    The Centrifuge IoT Security Platform can save significant time and money for governments, intelligence agencies, militaries, and their contractors.

    Instead of starting from ground-zero searching for vulnerabilities in a target's firmware, Centrifuge can point you to the exact binaries and function calls within those binaries that could be exploitable.

    Time is money in government circles, and the Centrifuge IoT Security Platform is a time/money game changer.

  • Where does the Centrifuge IoT Security Platform fit within my development lifecycle?
    We believe it should be the very last step just before production. But you know your processes better than we do. Feel free to contact us to discuss.

    Who should use the Centrifuge IoT Security Platform?

    Manufacturers, integrators, researchers, intelligence agencies and any company that develops, uses, integrates, or exploits firmware images and does not have access to the source code.

    The Centrifuge IoT Security Platform is just another code validation tool, right?
    Actually, no. The Centrifuge IoT Security Platform does not require access to source code. It requires a compiled firmware image with root filesystems; it unpacks the filesystems, identifies each executable binary, and analyzes each binary for vulnerabilities without ever seeing one line of source code!

    I have more questions!

    Then shoot us an email or give us a call! You'll find our contact info right here.