We have acquired 100 percent of the shares in Secure Thingz Inc., a provider of advanced security solutions for embedded systems in IoT. With the acquisition, we secure our position as a frontrunner in offering solutions for security in embedded systems.
Founded in 2016, Secure Thingz develops and sells products and services for implementation of embedded security in connected devices. The company has provided security solutions for the development platform Renesas Synergy Platform through its Secure Deploy™ platform offerings, which is developed in order to solve the major security challenges faced by companies developing for the IoT. Secure Deploy provides a cost-efficient way to guarantee foundation security in microprocessors and delivers security across the product life cycle.
“With the increasing number of connected devices, our customers are facing new challenges. One of the major challenges is how to deliver secure products in a world where even minor failures can lead to major consequences. As a first step, our customers need help mainly protecting themselves against overproduction and IP theft, and we are responding to this need with a new offering that provides possibilities to create modern workflow where security is included from start. The acquisition of Secure Thingz is a step in our increased ambition for future growth through new technology, new markets, new business models, and new relationships. It also secures our position as a frontrunner in a changing industry."
- Stefan Skarin, CEO, IAR Systems
Securing the IoT from development to deployment is critical to enable the Big Data revolution that powers our world. Whether it is to maintain privacy, enable critical infrastructure, or manage the lifecycle of our devices, scalable security is the foundation on which valuable services must be built. Our acquisition of Secure Thingz makes this happen.
Secure Thingz delivers products and services for the development, deployment and management of next-generation, secure devices. Together, we simplify the integration of application security from the point of inception. Only this approach ensures the confidentiality, integrity, availability and non-repudiation required for connected devices. This secure flow safeguards how high-value intellectual property is managed, and enables enterprises to define the new business models that will power our future.