Your Security Partner

Breaking News

ETAS strengthens cybersecurity capabilities with acquisition of TrustPoint Innovation Technologies, Ltd.

Read More

What We Do

Design In Trust, Enable Trust, Manage Trust
Design In Trust

Security Consulting: IoT and M2M communication security is a complex, multifaceted problem. While modern, standardized cryptosystems are sound, the problems with security systems usually arise through flawed implementations. Getting it right requires expertise in the security domain, operating environment, and knowledge of the potential paths of attack. TrustPoint's security experts are available to help design and support your security requirements specific to your application and products.

Enable Trust

Security Software Toolkits: TrustPoint's security toolkits are designed specifically for IoT and M2M applications. They perform all the security functions needed to establish secure and authenticated communications to and from IoT devices. TrustPoint's toolkits are quick and easy to integrate and do not require any specialized developer knowledge around security.

Manage Trust

Certificate Authority: TrustPoint's Certificate Authority (CA) is a Public Key Infrastructure (PKI) solution designed to support large scale IoT and machine-to-machine (M2M) applications. The PKI integrates directly with TrustPoint's security software toolkits to enable fast development and deployment of certificates to secure comminications and provide authentication and digital signatures for millions of devices. TrustPoints's CA is designed from the ground up for large scale deployments and can be delivered to the customer as an applicance or TrustPoint can provide as a managed service.


Latest Blog Posts

A New Beginning — TrustPoint Joining the ETAS Team

This morning we shared some exciting news that TrustPoint Innovation will be acquired by ETAS Canada, a subsidiary of the Bosch Group. This merger will …

Continue reading full post

LoRaWAN Security Overview

Low Power Wide Area Networks (LPWANs) are emerging to address Internet of Things applications where devices are distributed over a wide area. Think …

Continue reading full post

Trustpoint Twitter