Timesys VigiShield Secure by Design Security Services

Security Feature Implementation

VigiShield Secure by Design

Leverage our embedded device expertise to implement the core security features your device needs with an easy-to-understand, PSA certified, maintainable Yocto security layer.

Start the Conversation

Security Simplified

Need help implementing internal cybersecurity requirements or meeting industry standards?

Looking to collaborate with security experts to bring in best-in-class technologies to secure your devices?

Need help implementing internal cybersecurity requirements or meeting industry standards?

Looking to collaborate with security experts to bring in best-in-class technologies to secure your devices?

With VigiShield Secure by Design, we’ve distilled the security feature implementation process down into an easy-to-understand security layer that can be configured to meet your current customer and regulatory (e.g. NISTIR 8259A and ETSI EN 303) requirements.

VigiShield leverages widely used open source technologies, enables underlying hardware capabilities for best performance, and implements the security best practices recommended by regulatory and industry-specific bodies (FDA, IEC, etc).

With security built-in using VigiShield, device manufacturers can focus more on innovation during the product development process and get to market faster.

Requirement VigiShield Secure by Design* ETSI EN 303 645 NIST 8259A SB-327
Authentication/Password x x x x
Configuration x   x  
Crypto x x x  
Hardening x x x  
Logging x   x  
Secure Storage x x x  
Update x x x  

* PSA Certified Level 1 Version 2.0

Take advantage of our embedded security expertise.

For more than 20 years, Timesys has been the industry’s trusted partner for secure embedded software design and development. We provide device makers and system developers with tools and services to accelerate time to market and develop more secure products.

VigiShield Security Features

Prevent Firmware Tampering

Secure Boot / Chain of Trust

Ensure your device is not running tampered software by verifying its authenticity before execution. Establish software authenticity all the way from the bootloader to user applications by implementing:

  • Verified bootloader (NXP i.MX / QorIQ, Qualcomm Snapdragon, TI Sitara, Atmel SAMA5, Xilinx Zynq, NVIDIA® Jetson™, STM32MP1, Intel® x86 and Atom™, etc.) integrated with Yocto, Buildroot and more
  • Linux kernel verification (FIT image, SoC specific mechanisms)
  • Root filesystem verification (dm-verity, FIT image)
secure boot and chain of trust security implementation for embedded Linux
encryption and secure key storage services for embedded Linux

Keep Your IP and User Information Safe

Device Encryption and Secure Storage

You can protect IP and sensitive user information by encrypting data/software. It is also critical to protect the key used for encryption using a secure storage mechanism. Additionally, software that handles confidential data should run from within a hardware/software-isolated environment. We provide:

  • Anti-cloning (IP and Data Protection)
  • Key management and secure key storage
  • Data protection using encryption — In use, in motion, and at rest
  • Trusted Platform Module (TPM)
  • Device identity and authentication

Keep Your Updates Safe

Secure Software Updates

Our solution provides a mechanism to update/deploy software securely and deny unauthorized software installs. We provide:

  • Over-the-air (OTA) updates of the software on your embedded system
  • Package updates
  • Full OS updates
  • Signing of packages and images
  • Server authentication
  • Prevention of unauthorized rollback
secure over-the-air updates implementation for embedded Linux

secure communication service for embedded Linux

Keep Your Data In Transit Secure

Secure Communication

Ensure the connection from the device to the cloud and/or any external devices is protected. VigiShield secures device communication:

  • Authenticated and encrypted connections
  • Protection of device certificates/keys
  • Use best-in-class ciphers

Keep A Paper Trail

Security Audit Logs

Record any runtime security violations/breaches on the target system. VigiShield has:

  • Encrypted audit logs with user authentication
  • Customizable policies for recording security incidents

security audit log service for embedded Linux

security hardening service for embedded Linux

Lock It Down

Hardening

Our Linux kernel hardening service focuses on system configurations needed to reduce your product’s attack surface, decrease risk of compromise, and minimize breach impacts including:

  • Access and authorization
  • Vulnerabilities
  • Logging of all user access
  • Logging of access level changes by any program
  • Disabling unused services and ports
  • Addressing issues from penetration testing reports
  • Security-oriented configurations for packages and kernel

Know Where Your Software Comes From and Stay Resilient

Software Supply Chain Security

VigiShield Secure by Design helps you gain visibility into your software supply chain and secure it by:

  • Choosing the right open source software
  • Implementing end-to-end framework for supply chain integrity
  • End-to end-review of system security
  • SBOM and vulnerability report

secure your embedded Linux software supply chain

Medical Device Manufacturer Secures Autoclaves with VigiShield

Medical Device Manufacturer Secures Autoclaves with VigiShield

A leading medical device manufacturer improved the security of their connected autoclave products using VigiShield. Faced with the challenge of protecting proprietary software and preventing unauthorized code from running on their devices, they turned to VigiShield to enhance product security while streamlining development.

VigiShield helped implement a comprehensive security solution, beginning with a robust chain of trust from the bootloader through to the applications within the Yocto build environment. The integration included signing the bootloader, securing kernel updates, disabling unnecessary access points, and applying file system integrity checks. The manufacturer also benefited from training and consulting services that ensured seamless integration of security features into their build process.

The result was a significantly more secure product, with enhanced hardening techniques, encrypted key storage, and advanced counterfeit protection, all while maintaining a smooth development workflow.

The portable implementation of VigiShield also enabled seamless adaptation across different product lines using the same processor architecture. The company appreciated the flexibility and robustness of VigiShield’s architecture, enhancing their overall security and development efficiency.

Energy Supply and Automation Provider Secures Product Line with VigiShield

Energy Supply and Automation Provider Secures Product Line with VigiShield

A leading energy supply and automation solutions provider turned to VigiShield to secure their new product line. Faced with the need to protect critical information and meet stringent customer security requirements, the company implemented VigiShield for robust encryption, software authentication, and secure updates.

The company transitioned their build environment from Buildroot to Yocto, standardizing security across i.MX7 and i.MX6 platforms, focusing on custom i.MX7D design. VigiShield helped implement secure boot, encrypted file systems, and safeguarded communication channels, ensuring a strong chain of trust from the bootloader to the root file system. Additionally, key management and verification processes were established using PKCS11-based access and secure signature verification through trust zones. VigiShield also streamlined the update process with A/B partitioning and fallback mechanisms.

With VigiShield, the company successfully deployed a fully audited, secure solution that met all customer requirements and passed a third-party security audit with only minor enhancements. The transition improved product security and maintainability, positioning the company to scale future developments with confidence.

Defense Electronics Manufacturer Enhances Security with VigiShield

Defense Electronics Manufacturer Enhances Security with VigiShield

A major defense electronics manufacturer partnered with Timesys to strengthen security in their Linux-based solutions. With limited in-house security expertise, the company relied on VigiShield to implement robust security measures and on Timesys to provide training to their development team.

VigiShield established a secure boot process with a chain of trust extending to the root file system, leveraging Arm TrustZone and Secure OS for added protection. The solution also included OS hardening, encrypted partitions for secure data storage, and key management through CAAM and OP-TEE to prevent cloning and ensure data integrity. Timesys provided comprehensive training, equipping the team to effectively implement these features and maintain security standards moving forward.

The project successfully met all critical security requirements, helping the manufacturer transition from theory to practice while preparing them for future challenges. Timesys delivered a secure, scalable solution, empowering the team with the knowledge and tools to manage security independently.

EV Charger Manufacturer Enhances Security with VigiShield

EV Charger Manufacturer Enhances Security with VigiShield

An EV charger manufacturer leveraged VigiShield to secure its public charging stations, ensuring software authentication, user data privacy, and platform hardening. Faced with the challenge of maintaining update mechanisms while integrating new security features, the company turned to VigiShield for comprehensive solutions.

VigiShield implemented secure bootloader authentication, full disk encryption, and secure storage mechanisms using TrustZone and OP-TEE. Additional platform hardening steps included disabling weak protocols and consoles, alongside collaboration with Texas Instruments to optimize the design and leverage undocumented features. Timesys also provided consulting on security integration and manufacturing training, ensuring a smooth and secure product rollout.

As a result, the EV charger manufacturer successfully entered the market with a robust, secure platform that met high security and privacy standards, protecting user data and software integrity.

Automotive Manufacturer Secures Autonomous Material Handling Devices with VigiShield

Automotive Manufacturer Secures Autonomous Material Handling Devices with VigiShield

A leading automotive manufacturer relied on VigiShield to secure its autonomous material handling devices, enhancing the confidentiality of user data and proprietary software. With VigiShield’s support, the company implemented advanced security features, and received consulting and training to integrate these solutions into the Yocto build system.

VigiShield helped set up High Assurance Boot (HAB), enabled TrustZone for secure operation, and provided key management strategies. The collaboration extended across multiple regions, resolving issues with OP-TEE and implementing security features such as FIT image creation and bootloader authentication. Timesys also delivered training for secure manufacturing processes, ensuring successful security integration.

The result was a secure and reliable platform that protected data and software, meeting the manufacturer’s requirements, and ensuring smooth deployment in the field.

Consumer Electronics Company Protects Intellectual Property with VigiShield

Consumer Electronics Company Protects Intellectual Property with VigiShield

A consumer electronics company secured its innovative product with VigiShield’s anti-cloning solutions and long-term maintenance support. The company needed to protect five years of intellectual property while overcoming limited embedded security expertise within the development team.

VigiShield provided an anti-cloning solution by implementing High Assurance Boot (HAB), encrypted filesystems, and tamper protection using MX6 tamper pins. The integration of security features into the Variscite MX6 SOM platform and firmware update mechanisms ensured that the product maintained robust protection throughout development. VigiShield also supported the company with USB and network update processes, including kernel image signature checks and dm-crypt RFS, and long-term maintenance to address ongoing challenges.

With VigiShield’s expertise, the company successfully protected its intellectual property and achieved a secure product launch, overcoming technical challenges and safeguarding its innovative design.

Medical Device Manufacturer Secures Autoclaves with VigiShield

 

Medical Device Manufacturer Secures Autoclaves with VigiShield

A leading medical device manufacturer improved the security of their connected autoclave products using VigiShield. Faced with the challenge of protecting proprietary software and preventing unauthorized code from running on their devices, they turned to VigiShield to enhance product security while streamlining development.

VigiShield helped implement a comprehensive security solution, beginning with a robust chain of trust from the bootloader through to the applications within the Yocto build environment. The integration included signing the bootloader, securing kernel updates, disabling unnecessary access points, and applying file system integrity checks. The manufacturer also benefited from training and consulting services that ensured seamless integration of security features into their build process.

The result was a significantly more secure product, with enhanced hardening techniques, encrypted key storage, and advanced counterfeit protection, all while maintaining a smooth development workflow.

The portable implementation of VigiShield also enabled seamless adaptation across different product lines using the same processor architecture. The company appreciated the flexibility and robustness of VigiShield’s architecture, enhancing their overall security and development efficiency.

Energy Supply and Automation Provider Secures Product Line with VigiShield

 

Energy Supply and Automation Provider Secures Product Line with VigiShield

A leading energy supply and automation solutions provider turned to VigiShield to secure their new product line. Faced with the need to protect critical information and meet stringent customer security requirements, the company implemented VigiShield for robust encryption, software authentication, and secure updates.

The company transitioned their build environment from Buildroot to Yocto, standardizing security across i.MX7 and i.MX6 platforms, focusing on custom i.MX7D design. VigiShield helped implement secure boot, encrypted file systems, and safeguarded communication channels, ensuring a strong chain of trust from the bootloader to the root file system. Additionally, key management and verification processes were established using PKCS11-based access and secure signature verification through trust zones. VigiShield also streamlined the update process with A/B partitioning and fallback mechanisms.

With VigiShield, the company successfully deployed a fully audited, secure solution that met all customer requirements and passed a third-party security audit with only minor enhancements. The transition improved product security and maintainability, positioning the company to scale future developments with confidence.

Defense Electronics Manufacturer Enhances Security with VigiShield

 

Defense Electronics Manufacturer Enhances Security with VigiShield

A major defense electronics manufacturer partnered with Timesys to strengthen security in their Linux-based solutions. With limited in-house security expertise, the company relied on VigiShield to implement robust security measures and on Timesys to provide training to their development team.

VigiShield established a secure boot process with a chain of trust extending to the root file system, leveraging Arm TrustZone and Secure OS for added protection. The solution also included OS hardening, encrypted partitions for secure data storage, and key management through CAAM and OP-TEE to prevent cloning and ensure data integrity. Timesys provided comprehensive training, equipping the team to effectively implement these features and maintain security standards moving forward.

The project successfully met all critical security requirements, helping the manufacturer transition from theory to practice while preparing them for future challenges. Timesys delivered a secure, scalable solution, empowering the team with the knowledge and tools to manage security independently.

EV Charger Manufacturer Enhances Security with VigiShield

 

EV Charger Manufacturer Enhances Security with VigiShield

An EV charger manufacturer leveraged VigiShield to secure its public charging stations, ensuring software authentication, user data privacy, and platform hardening. Faced with the challenge of maintaining update mechanisms while integrating new security features, the company turned to VigiShield for comprehensive solutions.

VigiShield implemented secure bootloader authentication, full disk encryption, and secure storage mechanisms using TrustZone and OP-TEE. Additional platform hardening steps included disabling weak protocols and consoles, alongside collaboration with Texas Instruments to optimize the design and leverage undocumented features. Timesys also provided consulting on security integration and manufacturing training, ensuring a smooth and secure product rollout.

As a result, the EV charger manufacturer successfully entered the market with a robust, secure platform that met high security and privacy standards, protecting user data and software integrity.

Automotive Manufacturer Secures Autonomous Material Handling Devices with VigiShield

 

Automotive Manufacturer Secures Autonomous Material Handling Devices with VigiShield

A leading automotive manufacturer relied on VigiShield to secure its autonomous material handling devices, enhancing the confidentiality of user data and proprietary software. With VigiShield’s support, the company implemented advanced security features, and received consulting and training to integrate these solutions into the Yocto build system.

VigiShield helped set up High Assurance Boot (HAB), enabled TrustZone for secure operation, and provided key management strategies. The collaboration extended across multiple regions, resolving issues with OP-TEE and implementing security features such as FIT image creation and bootloader authentication. Timesys also delivered training for secure manufacturing processes, ensuring successful security integration.

The result was a secure and reliable platform that protected data and software, meeting the manufacturer’s requirements, and ensuring smooth deployment in the field.

Consumer Electronics Company Protects Intellectual Property with VigiShield

 

Consumer Electronics Company Protects Intellectual Property with VigiShield

A consumer electronics company secured its innovative product with VigiShield’s anti-cloning solutions and long-term maintenance support. The company needed to protect five years of intellectual property while overcoming limited embedded security expertise within the development team.

VigiShield provided an anti-cloning solution by implementing High Assurance Boot (HAB), encrypted filesystems, and tamper protection using MX6 tamper pins. The integration of security features into the Variscite MX6 SOM platform and firmware update mechanisms ensured that the product maintained robust protection throughout development. VigiShield also supported the company with USB and network update processes, including kernel image signature checks and dm-crypt RFS, and long-term maintenance to address ongoing challenges.

With VigiShield’s expertise, the company successfully protected its intellectual property and achieved a secure product launch, overcoming technical challenges and safeguarding its innovative design.

VigiShield Add-Ons

Yocto/BSP and Security Customizations

Apart from the standard PSA certified VigiShield offering, we provide customizations as part of our Professional Services which covers hardware enablement, Yocto customizations, custom security feature implementations, address issues from penetration testing reports, integration with device management / IoT cloud services, and more!

Out-of-the-box Container Support

Support legacy apps with outdated dependencies, improve productivity by decoupling app development from the platform development schedule, and improve portability and updatability with this container support add-on that ensures app containers can run on different hardware and OS platforms, and be updated without needing to update the base OS. This add-on additionally offers boot time and image size optimizations, pre-integrated docker runtime support in the base OS, tooling to integrate the container into Yocto image, and more.

Security Training

Whether you are new to security, looking for consultation to refine your security requirements or help integrating our solutions into your processes; we can help with our customized security training offerings.

Trusted Applications for Secure OS

For customers seeking enhanced security and key provisioning, we have expertise in implementing “trusted applications” that can be deployed on a secure OS (e.g: OP-TEE, Trusty, etc) running on a trusted execution environment. Ensure your keys are never exposed and vastly reduce the attack surface of your applications by provisioning keys and certificates into the PKCS#11 compatible keystore.

Code-Signing Key Protection

For an additional layer of security, this ready-to-use tooling ensures your keys are never exposed outside of Hardware Security Modules (HSMs) by storing the code signing key on HSMs and requiring the build system to request signing using a PKCS#11 interface. With this feature, you can unify your key management across all products, simplify and standardize your signing process, and ensure that your devices meet compliance standards such as FIPS 140-2, Level 3. This includes signature support for bootloader, fitImage, dm-verity, and firmware update bundles and can easily be integrated into your CI/CD DevSecOps.

Secure manufacturing assistance

We have expertise in developing the manufacturing tooling required for secure software programming and provisioning. We can help integrate your custom or 3rd party solutions for securely storing device certificates.

Manufacturing Protection for i.MX8 and i.MX9

To further help you securely build devices at contract manufacturing facilities and prevent counterfeit attempts, this VigiShield add-on enables you to detect unauthorized production, protect your IP at manufacturing facilities, verify your processors, and ensure SoC authenticity. On networked devices, you’ll be able to authenticate the device with a provisioning server using i.MX manufacturing protection keys. For non-networked devices, encrypt your secrets using i.MX manufacturing protection keys and bundle them with the production image.

Long Term Linux OS security and maintenance

Timesys Linux OS/BSP Maintenance subscription service provides long-term security updates and maintenance of your Linux OS. Using this service, device manufacturers can rely on timely security updates that can be deployed to devices in the field with the secure and robust OTA update mechanism included in VigiShield.

System Security Audit and Review

By performing a risk analysis, our audit services can help you determine what potential threats your system might encounter and what should be secured.

 

VigiShield
System Security Baseline

PSA Certified   NXP i.MX8
  ST STM32MP SoCs
  NXP i.MX6
  NXP QorIQ
  Xilinx Zynq, Ultrascale+
  NVIDIA Jetson
  Qualcomm Snapdragon
  TI Sitara AM6xx
  Microchip/Atmel SAMA5
  Intel x86 and Atom

security services to help you reduce the attack surface of your embedded Linux device

Reduce the attack surface of your device

Improve the security posture of your device by auditing, hardening, optimizing your software footprint, and implementing secure boot and chain of trust.

security services that help you avoid productions delays

Avoid production delays by securing your software supply chain

Avoid the rework and cost overruns that come with deploying security too late in design. Leverage detailed SBOMs and an end-to-end framework to ensure the integrity of your software supply chain.

SEE THE SOLUTION YOU NEED?

Start the Conversation

Stop worrying about how you are going to find the engineering time and in-house expertise to give your product the professional architecture and security attention it needs.

See the impact of Secure by Design in action

Secure Boot in Industrial Welding

 

Case Study

Secure Boot in Industrial Welding

Timesys’ security expertise helps manufacturer of industrial welding products deliver a secure IoT gateway for its factory installed products

Read the Case Study

 

Webinar

Establishing secure boot and chain of trust

Explore the “Secure by Design” approach to software security for embedded systems using NXP i.MX processors.

Watch the Webinar

VigiShield Secure By Design for Yocto

 

Blog

VigiShield Secure By Design for Yocto

Explore the “Secure by Design” approach to software security for embedded systems using NXP i.MX processors.

Read the Blog

IoT security simplified with PSA Certified VigiShield

 

Blog

IoT security simplified with PSA Certified VigiShield

From customer expectations to cybersecurity regulations, the demand for security assurance of devices has never been greater.

Read the Blog

Securing U-Boot: A Guide to Mitigating Common Attack Vectors

 
Blog

Securing U-Boot: A Guide to Mitigating Common Attack Vectors

Learn about ways in which you can protect and secure U-Boot implementations on your embedded systems.

Read the Blog

 
News Releases

Timesys VigiShield Secure By Design Announces PSA Certification

With VigiShield Secure by Design, Timesys has distilled the security feature implementation process down into an easy-to-understand, PSA Certified, maintainable Yocto security layer

Read the Blog