How do you leverage best practices for designing, developing, securing and maintaining your IoT and edge devices?
How do you accelerate time-to-market for embedded system software?
How do you optimize every stage of your IoT software development lifecycle?
Engineering Expertise for Your Rich IoT and Intelligent Edge Devices
We leverage our expertise in real-time embedded software, along with RTLinux, RTOSes, drivers, firmware, and connectivity to deliver connected applications for IoT solutions.
Our experience extends across embedded systems for industrial automation, home automation, commercial building control, wearables, consumer products, transportation and medical devices.
Meet industry standards
Simplify meeting cybersecurity standards, regulations and industry guidelines including NIST 8259 Foundational Cybersecurity
Activities for IoT Device Manufacturers & 8259A IoT Device Cybersecurity Capability Core Baseline and ETSI EN 303 645 — Cyber Security for Consumer Internet of Things: Baseline Requirements
Design security into your product
Secure By Design solution integrating best practice security features
Monitor and remediate CVEs
Unique SCA features, optimized for embedded systems, providing more accurate and streamlined vulnerability (CVE) management and long term maintenance
Collaborate with embedded experts
Timesys’ embedded system Software Engineering Services enable rapid development of secure, Rich IoT and Intelligent
Edge Devices
Our experience extends across embedded systems for industrial automation, home automation, commercial building control, wearables, consumer products, transportation and medical devices.
Our IoT development, connectivity enablement and cloud integration expertise includes:
- In-board peripherals including i2c, SPI, one-wire, and many others
- LCD and Keypad interfaces
- Motion control and digital signal processing
- M2M communication including WiFi, Zigbee, 5G, Bluetooth, Ethernet, RS485, and others
- Telematics, GPS integration
- Power-saving modes
- Multicore communication (RToS and embedded Linux)
- Device security including update service, secure boot, and verified boot
- Cross Platform Mobile applications developed with Xamarin
- Mobile to embedded device integration
- Cloud Integration with AWS and Azure SDKs
- Remote access, device management and OTA
Streamline and Simplify Compliance With Cybersecurity Standards, Regulations, and Industry Guidelines
NIST 8259 Foundational Cybersecurity
Activities for IoT Device Manufacturers &
8259A IoT Device Cybersecurity Capability Core Baseline
Recommendations manufacturers should consider performing before their IoT devices are sold to customers and core IoT device cybersecurity functionality including:
- Device identification
- Device configuration
- Data Protection
- Logical access to interfaces
- Software update
- Cybersecurity state awareness
ETSI EN 303 645 — Cyber Security for Consumer Internet of Things: Baseline Requirements
Development and manufacturing guidance for securing consumer IoT products including:
- No universal default passwords
- Implement a means to manage reports of vulnerabilities
- Keep software updated
- Securely store sensitive security parameters
- Communicate securely
- Minimize exposed attack surface
- Ensure software integrity
- Ensure that personal data is secure
- Make system resilient to outages
- Examine system telemetry data
- Make it easy for users to delete user data
Secure By Design
Vigishield Secure By Design Services
Security services to accelerate and simplify your implementation of:
- Secure boot and chain of trust
- Encrypted storage
- Secure firmware updates
- Device security hardening: Bootloader, kernel and user space
- Protected hardware ports: JTAG, serial
- Secure world/trusted software development (e.g.: OP-TEE software)
- Tamper protection
- Key and certificate management
- Industry security standard compliance
Stay Secure
Vigiles Vulnerability Management Solution
Software-as-a-service toolset developed by Timesys to provide:
- Automatic generation of an accurate Software Bill of Materials (SBOM) for industrial control, automation and IIoT devices running embedded Linux
- Accurate vulnerability detection with SBOM filtering
- Integration with Yocto, Buildroot, Timesys Factory build systems
- Accurate, curated meta-data on software components for higher rates of vulnerability identification and accuracy, with fewer false positives
- Streamlined remediation of vulnerabilities with efficient collaboration
Linux OS and BSP Maintenance
Our turnkey BSP Lifecycle Maintenance Service bringing our team of embedded system software experts to manage all aspects of maintaining the OS of your embedded Linux BSPs. We take care of:
- Monitoring and applying updates and patches, validating changes and providing you with reports on status
- Maintaining the strongest security posture throughout device deployment
- Providing you with ready-to-deploy platform updates
How Timesys has helped customers successfully bring IoT products to market faster, with higher quality, richer feature sets, and with stronger security
Board bring up, Yocto customization and camera for Consumer / IoT
A leading manufacturer of consumer appliances needed help developing a next-gen smart home appliance featuring a TI Sitara based custom board with camera connected with Amazon AWS Cloud. See how Timesys worked as an extension of their team to support the requirements definition, software architecture risk reduction, and software implementation of their next-gen product.
HAVE A PROJECT YOU’D LIKE TO DISCUSS?
Start the Conversation
Stop worrying about how you are going to find the engineering time and in-house expertise to give your product the professional architecture and security attention it needs.