This website requires a modern browser to look and function perfectly! Browse in security and be one the cutting edge of technologic innovations with Chrome!
Our white paper on the iSIM technology is now available. Click here to access it for free!
We endeavor to provide silicon/ASIC providers with world-class innovative embedded security solutions, in the form of certified Secure Enclaves & IP, to create unparalleled trust for existing and emerging applications in the digital world.
In a world where technological progress is increasing and connectivity possibilities are infinite, the associated cyberattacks are increasing in number and intensity. Managing threats to data privacy and application protection has never been so critical or strategic. We believe that vulnerabilities can be reduced by adopting a security-by-design approach, with embedded security solutions.
Our TESIC Secure Enclave IP portfolio ensures security with proven resistance to physical and logical attacks. TESIC products include programmable and customizable solutions that enable product designers to seamlessly integrate security solutions that provide the most efficient power, size, and performance.
We guarantee that any SOC that integrates our TESIC Secure Enclave solution will obtain the appropriate security certification from recognized external evaluation laboratories (SESIP, FIPs, PSA Level 3, and Common Criteria). We can provide a comprehensive service to manage the certification process; from liaising with your chosen laboratory, and preparing the required extensive documentation package, to handling the day-to-day project management.
We provide a complete provisioning and key management service. We can interface with your chosen manufacturing site to initially provision your SoC and further manage keys and authenticated firmware from your third-party OS providers, maintaining the chain of trust. This is handled from our (MSSR) Minimum Site Security Requirements Common Criteria EAL6+ audited and certified site in France.
State-of-the-art secure hardware and software, certified IPs, such as Secure Boot, TRNG, SHA-2, SHA-3, PSA Crypto, PQC, AES, ECC, RSA, etc. Our commitment to security begins with an API-first approach, ensuring a robust foundation for seamless, protected interactions
Interested in joining the adventure – check out our career section
Products
Applications