IAR Embedded Trust

Secure your code, applications, and devices right from the start by simplifying embedded security with the Root of Trust.



We verify authorized software code and application installation to protect your IPs from the root and ensure the cryptographic methods are applied to your chips and devices. You will have the Root of Trust quickly.


Active IP protection

We promise critical key management to lock your applications onto authorized devices, providing secured applications and devices access right from the boot process.



We support unique identification for software applications and device hardware, preventing counterfeits and encrypting your manufacturing.



We manage your software update processes to provide protection against roll-back attacks and versioning threats.

Product overview

With the complete embedded security features, IAR Embedded Trust meets your demands to protect software and devices once you power on the booting system. You will implement industry-leading security solutions and achieve security compliance quickly.

Features and highlights

IAR's approach to tackling embedded security vulnerabilities

Discover how IAR addresses embedded security vulnerabilities in this informative infographic. Learn about the key features and benefits of their Late-Stage Embedded Security solution, designed to provide comprehensive protection for embedded systems. 

Download infographic

Potential security issues in your development processes and products


The value delivered by IAR


Cost efficient solution

Developers can enable security and get the whole software and hardware solution to build embedded security with limited budget .


Reduce the development time

Developers do not need to design a security implementation on their own, saving time.


Secure manufacturing with zero-trust

Device brands can secure all programming processes even if they choose zero-trust manufacturers to execute device provisioning.


Modifiable source code delivery

Developers can get the whole source code to use, modify and customize. They can see and monitor everything in the boot process.


Easy application migration

Developers can simply port the original code and applications onto various chip platforms, reducing development time and enabling high compatibility benefits.


Reuse code to ease development process

Developers can port the written code and applications onto all future development projects, reducing development time and going to market faster.


On-Demand Webinars: Embedded Security Series

Register for our on-demand webinars to build your end-to-end embedded security for your devices.


Webinar 1: Authenticity

How to ensure product ownership and integrity 


Webinar 2: Active IP protection

Stopping reverse engineering from the root 


Webinar 3: Anti-rollback

Avoiding the dangers of outdated firmware


Webinar 4: Anti-cloning

Preventing the risk of unwanted product copies 

Explore all our webinars

Providing a robust secure bootloader to solve your major security risks


Developers can build a secure bootloader with IAR Secure Boot Manager to achieve embedded security right from the start of the boot processes, preventing major security risks.


Our soluitons offer:

  • Root of Trust: Unique device information and trusted functions to ensure the device is operating as designed and has not been interfered with
  • Reduced development time: Easily port your current design to new devices and reuse your code
  • Legislation compliance: Build secure products to meet the requirements and sell to different geographies


Providing secure software update to protect data

Enable protection of your software update processes, protecting data, tackling various security vulnerabilities.


We strive to:

  • Authenticate applications and devices
  • Encrypt code to protect your IP
  • Update your firmware securely
  • Help you stay compliant with security legislation

Customizing your needs

We provide 5 product editions for IAR Embedded Trust, customizing your needs

Supported devices

Our security tools and services offer support for a wide range of devices, including Arm-based MCUs from Microchip, STMicroelectronics, Renesas, Infineon* and NXP, as well as the Renesas RX MCU family devices, enabling you to choose the right MCU for the security and functional needs of your application. In addition, support for the vast majority of MCUs can be achieved through the use of Hardware Abstraction Layer (HAL).

*Contact us for details on the Infineon device support included in IAR Embedded Secure IP

The device families in the list are ported and tested by us. Notice that some specific device variants might not have been tested.

We are constantly updating our growing list of supported devices. If your device is not listed here, contact us to find out when your device will be supported.


STMicroelectronics Renesas Microchip NXP Silicon Labs










RA4Mx (RA4M2)

RA6Mx (RA6M3)

RX6xx (65N/66T)

RX7xx (72M/72N/72T)












End-to-end embedded security

IAR Secure Deploy are complementary tools to combine with IAR Embedded Trust and IAR Embedded Secure IP to achieve production stage security and secure global production processes with flexible cost-saving at your terms.

Learn more about IAR Secure Deploy

Want to know more?

We are present worldwide to help you wherever you are, and we are happy to answer any questions you might have about our products.

Get quote

Want to use this product in your development projects? Our sales team is here to guide you to the right solution. Complete this form, and we will get back to you with a price quote tailored to your needs.

* read our Privacy policy

We do no longer support Internet Explorer. To get the best experience of iar.com, we recommend upgrading to a modern browser such as Chrome or Edge.