LinuxLink Login   |   1.866.392.4897 |    |  Contact Us            English EN French FR German DE Japanese JA

TRST Secure by Design: Implement Device Security During Development

Timesys secure boot and chain of trust services

Secure Boot / Chain of Trust

Ensure your device is not running tampered software by verifying its authenticity before execution. Our secure boot / chain of trust service helps you establish software authenticity all the way from the bootloader to user applications.

Timesys device encryption and secure key storage services

Device Encryption and Secure Key Storage

You can protect IP and sensitive user information by encrypting data/software. Our services help you encrypt data/software and also protect the key used for encryption. Additionally, our services can help you set up a hardware/software-isolated environment for running software that handles confidential data.

Timesys OTA software update service

OTA Software Updates

Our security services can help you determine how to update/deploy software securely and deny unauthorized software installs.

Timesys security audit service

Security Audit

By performing a risk analysis, our audit services can help you determine what potential threats your system might encounter and what should be secured.

Timesys system hardening service


Our hardening service focuses on system configurations needed to reduce your product’s attack surface.

TRST Stay Secure: Manage Vulnerabilities

Timesys security vulnerability monitoring and notification

Timesys Vigiles™ — Real-time Security Vulnerability Monitoring for More Secure Products

Timesys Vigiles security monitoring and notification service eliminates the time spent monitoring CVEs and assessing their risks.

With Vigiles update management service, applying updates and security patches into your software is easy — and you remain in control of what gets updated.

Timesys BSP maintenance service

Timesys BSP Lifecycle Maintenance

The Timesys BSP Lifecycle Maintenance and Timesys TRST teams have the expertise to maintain the security of your BSP, on your custom hardware, allowing your team to focus on improving products to expand your customer base.

Timesys TRST Security Solutions    Timesys TRST Security Services including secure boot    Timesys Security Vulnerability and Patch Notification Service

Have a security-related question or a project you’d like to discuss?

We’d be happy to talk to you about how our TRST Device Security Solutions can help you secure your embedded device and maintain its security posture throughout its lifecycle. Simply fill out the form, and we will be in touch within one business day to schedule a call/meeting date and time that works for you.

* Denotes required field.

Security Resources

Timesys TRST Product Protection Solutions data sheet

Timesys Datasheet

Timesys TRST Device Security Solutions

documentation icon

Timesys Datasheet

Timesys Vigiles Real-time Security Vulnerability Monitoring

documentation icon

Timesys Datasheet

Timesys TRST Security Services

documentation icon

Timesys CVE Notification

View a Sample Timesys CVE Report

try meta-timesys security notification for Yocto

meta-timesys Yocto Layer

Try Timesys Security ‘Pull’ Notification for Yocto

Timesys Security Video

Timesys Security Vulnerability and
Patch Notification Service for Yocto

Timesys Security Video

Timesys Security Vulnerability and
Patch Notification Service for Factory

Timesys Security Video

Timesys Patch Notification Service

Timesys Security Video

Secure Boot on i.MX 6Quad Powered Advantech DMS-BA16 Qseven Module

Timesys Security Video

Secure Firmware Update Using SWUpdate

Timesys University Webinar Series | Sponsored by:

Advantech NXP and Timesys

Reduce Risk with RISC:
Designing and Maintaining Secure Embedded Linux Devices with Advantech RISC Platforms

View Details