WithSecure™ Foundry

Protecting your organization means understanding what you’re up against.

Security, embedded right from the beginning.

We are breakers and makers, testing and building software and hardware products from the ground up since 2005.

This has given us a pragmatic engineering mindset that makes those products not only effective and secure, but practical to implement in your organization. Our hardware security services have been awared with IEC 62443 certification. Find out more in our detailed service overview.

Expertise

Hardware_1

Hardware

We design hardware with built-in security, from industrial data loggers to personal cryptocurrency wallets.

Firmware

We engineer hardened bootloaders, secure monitors, and runtime environments with minimal attack surface.

Software_2

Software

We develop embedded applications for numerous industries and functions, combining our engineering and hacking skills.

Secure boot_2

Secure boot

We are the leading world experts in Secure Boot implementations. We broke several, trust us in securing them.

Safety_2

Safety

We secure critical equipment on aircraft, automotive vehicles, marine vessels, and satellites – where security is critical to human safety.

Open source_1

Open Source

We ensure close ties with the industry and a test-heavy approach by leading open hardware and open source projects.

Our approach

Design

Design

Understand and select the right features offered by application processors to achieve secure product design.

  • There are no remote hardware upgrades - we make sure that correct and secure components are there from the start
  • We plan ahead to contain breaches with built-in isolation, data diodes, and separation of roles
  • Hardware, firmware, software: orchestrated design for every layer of your architecture
  • Built-in risk assessment and threat analysis
Development

Development

Take secure products from the drawing board to deployment.

  • Orchestrated hardware, firmware, and software development
  • Development with a cyber-secure mindset, trained in breaking code, and defending it
  • Research-driven, production-grade focused – what we gather in technical insight we apply in the real-world
  • Built-in risk assessment and threat analysis
Delivery

Delivery

Secure products are manageable, maintainable, and verifiable. Our delivery process ensures control stays in your hands, with full code transparency, simple-to-interpret documentation, and tested deployments.

  • Mission-critical solutions delivered to the strictest production-grade standards
  • Full source code delivery
  • Integration workshops and training
Support

Support

We’re here for the long-haul, giving you products that are manageable and maintainable in the short, medium and long term, by you.

  • IEC-62443-4-1 certified secure development lifecycle
  • Incident response and vulnerability remediation
  • Vulnerability disclosure coordination
  • Feature enhancement and continuous security support

Our products

USB armory

The world's smallest secure, open-source-driven computer. It can safeguard data and run trusted applications, preventing unauthorized access or execution. Minimal attack surface, vast performance and capabilities.

Armory Drive

Our encrypted storage solution that provides the convenience of a USB drive without compromising on protection. It protects the encryption keys to your data, even when accessed from unknown or compromised devices.

Case studies

Research projects

USB armory

USB armory

The world’s smallest secure, open-source-driven computer.

GitHub repository

GoKey

The bare metal Go smartcard.

GitHub repository

GoTEE

Go Trusted Execution Environment (TEE) w/ TrustZone.

GitHub repository

Armory Drive

USB encrypted drive.

GitHub repository
Tools

TamaGo

Bare metal Go for ARM SoCs.

GitHub repository

Crucible

One-Time-Programmable (OTP) fusing tool.

GitHub repository

INTERLOCK

File encryption and HSM front-end.

GitHub repository
Security advisories

Advisories

Our discovered vulnerabilities on hardware and software.

GitHub repository

Want to talk more in details?

Complete the form, and we'll be in touch as soon as possible.

Przetwarzamy dane osobowe, które nam udostępniasz, zgodnie z naszą Korporacyjną Polityką Prywatności Biznesu.

Our accreditations and certificates