IAR Embedded Trust

Secure your code, applications, and devices right from the start by simplifying embedded security with the Root of Trust.

IAR solutions to address security challenges

IAR Embedded Trust delivers end-to-end security solutions to mitigate potential security problems quickly and easily, protecting your data and devices.

01

Authenticity

We verify authorized software code and application installation to protect your IPs from the root and ensure the cryptographic methods are applied to your chips and devices. You will have the Root of Trust quickly.

02

Active IP protection

We promise critical key management to lock your applications onto authorized devices, providing secured applications and devices access right from the boot process.

03

Anti-cloning

We support unique identification for software applications and device hardware, preventing counterfeits and encrypting your manufacturing.

04

Anti-rollback

We manage your software update processes to provide protection against roll-back attacks and versioning threats.

Infographics

IAR's approach to tackling embedded security vulnerabilities

Expore highlights and features for Late-Stage Embedded Security and Advanced Embedded Security.

 

 

Download PDF
info-graphic-security.jpg

Potential security issues in your development processes and products

screenshot-2023-03-14-082536-ew.png

Providing a robust secure bootloader to solve your major security risks

engineers.png

Developers can build secure bootloader with IAR Secure Boot Manager to achieve embedded security right from the start of boot processes, preventing major security risks.

 

Our services offer:

  • Root of Trust: Unique device information and trusted functions to ensure the device is operating as designed and has not been interfered with
  • Reduce your development time: Easily port your current design to new devices and reuse your code
  • Legislation compliance: Build secure products to sell into various geographies

 

Providing secure software update to protect data

Enable protection of your software update processes, protecting data, tackling various security vulnerabilities.

 

We strive to:

  • Authenticate applications and devices
  • Encrypt code to protect your IP
  • Update your firmware securely
  • Help you stay compliant with security legislation
adobestock_386832865-1-1.jpeg

IAR delivers values

1

Cost efficient solution

Developers can enable security and get the whole software and hardware solution to build embedded security with limited budget .

2

Reduce the development time

Developers do not need to design a security implementation on their own, saving time.

3

Secure manufacturing with zero-trust

Device brands can secure all programming processes even if they choose zero-trust manufacturers to execute device provisioning.

4

Modifiable source code delivery

Developers can get the whole source code to use, modify and customize. They can see and monitor everything in the boot process.

5

Easy application migration

Developers can simply port the original code and applications onto various chip platforms, reducing development time and enabling high compatibility benefits.

6

Reuse code to ease development process

Developers can port the written code and applications onto all future development projects, reducing development time and going to market faster.

Product overview

With the complete embedded security features, IAR Embedded Trust meets your demands to protect software and devices once you power on the booting system. You will implement industry-leading security solutions and achieve security compliance quickly.

Customizing your needs

We provide 5 product editions for IAR Embedded Trust, customizing your needs

Webinar

Live Webinars: Embedded Security Series

Register for our upcoming live webinars to build your end-to-end embedded security for your devices.

 

Webinar 1: Authenticity

How to ensure product ownership and integrity 

 

Webinar 2: Active IP protection

Stopping reverse engineering from the root 

 

Webinar 3: Anti-rollback

Avoiding the dangers of outdated firmware

 

Webinar 4: Anti-cloning

Preventing the risk of unwanted product copies 

Explore all webinars
1-kopiera.jpg

Supported devices

Our security tools and services offer support for a wide range of devices, including Arm-based MCUs from Microchip, STMicroelectronics, Renesas, Infineon* and NXP, as well as the Renesas RX MCU family devices, enabling you to choose the right MCU for the security and functional needs of your application. In addition, support for the vast majority of MCUs can be achieved through the use of Hardware Abstraction Layer (HAL).

*Contact us for details on the Infineon device support

All devices in the list are ported and tested by us.

We are constantly updating our growing list of supported devices. If your device is not listed here, contact us to find out when your device will be supported.

 

STMicroelectronics Renesas Microchip NXP Silicon Labs

STM32F4x

STM32F7x

STM32H7x

STM32L4x

STM32L5x

STM32U5x

STM32WB5x

RA4Mx (RA4M2)

RA6Mx (RA6M3)

RX6xx (65N/66T)

RX7xx (72M/72N)

RXxxT (RX72T)

RA2xx (RA2L1)

 

SAML11

PIC32LM5164LSx0

K2x

K6x

KV5x

LPC55x

i.MX RT10x4

EFM32xG22

EFR32FG23

 

End-to-end embedded security

Together with IAR Embedded Trust, IAR creates IC programming tool - IAR Secure Deploy - to end-to-end embedded security from design to mass production.

Learn more about IAR Secure Deploy
adobestock_363948837-1.jpeg

Want to know more?

We are present worldwide to help you wherever you are, and we are happy to answer any questions you might have about our products.

Get quote

Want to use this product in your development projects? Our sales team is here to guide you to the right solution for you. Complete this form and we will get back to you with a price quote tailored for your needs. We look forward to your request!

* read our Privacy policy

We do no longer support Internet Explorer. To get the best experience of iar.com, we recommend upgrading to a modern browser such as Chrome or Edge.