SCI Consultancy Services

Digital security consultancy for next-generation devices

Cyber security is a challenge for most organisations, but even more so for teams defining next-generation devices. Attempting to stay ahead of threats and future compromises is not easy, and requires a focus on critical core technologies, implementation, and software.

At SCI we have a history of leadership in advanced device security, having led in this technology for over 15 years. We have worked with IP vendors, chip designers, fabs, and software organisations to drive the integration of advanced technologies

As leader is legislation requirements we have worked on the foundations and best practices of practically every legislative requirement in the digital security domain, and retain expertise in definition, regulation and compliance with the leading requirements globally.

Consultancy Services

SCI works across market verticals and technology implementation to focus on delivery digital security into your devices.

Examples include:

  • Supporting Tier-1 microprocessor vendors to support the design and implementation of microcontroller and microprocessor security solutions.
  • Supporting Tier-1 mobile phone vendors to implement TrustZone based TEE and Trusted Applications
  • Working with government agencies to introduce next-generation isolation and separation software

Digital Device Design

Having led the introduction of the era-defining TrustZone system at Arm, the team have industry leading knowledge of implementations across systems. Covering mobile devices, game stations, server, and embedded microprocessors, there are a huge array of implementation options to be chosen, and balances to be made.

Root of Trust (RoT) and modern Root of Execution (RoE) systems are critical to many applications, protecting keys, managing digital wallets, and protecting identity. There are significant trade-offs and pitfalls to be aware of to ensure robust products

Secure System Software

With over 70% of modern attacks enabled by memory misallocation, software is critical across open, and secure, domains.

With market leading knowledge of topics including Trusted Execution Environments (TEE), Trusted Applications (TA), Trusted Protection Module (TPM), and advanced software developments including CHERI and RUST based solutions, our experts are at the leading edge of implementation. 

Legislation & Compliance

Legislation is rapidly evolving, including Product Security (UK), Cyber Resilience (EU) and Cyber Security Improvement Acts (US). 

The UK has already implemented legislation with real teeth, and fines of over $10M, impacting any consume product shipped into the country from anywhere in the globe. Ensuring compliance, and highlighting regulatory requirements is critical to every company, but few are truly ready. 

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details and accept the service to view the translations.