Guides
SSDs are increasingly popular for storing data, but they open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Find out how this security problem and other issues created by using an embedded SSD can be eliminated by reading our guide.
Published Technical Articles
Unsurprisingly, plenty of governments, organisations and companies are considering afresh what they can do to bolster their cybersecurity, in light of the very real threat of hacking and cyberattacks.
With that in mind, we’d like to direct you to a recent article of ours published in Electronics World – Protecting IIoT devices from cyberattacks
Technical Blogs
There is a security risk inherent in using removable memory devices such as USB Sticks. The wide availability of USB drives makes them attractive to hackers and an ideal vehicle for introducing malware into a company from within its IT Firewall. Read in our technical blog how moving to industrial removable memory devices could make your environment cyber safe
Powerloss protection (PLP) protects your local system from experiencing data corruption or loss, in turn reducing the risk of corrupted data being stored. To get the full story on PLP and decide whether it could be valuable for you, have a read of our technical blog
Flexxon X-PHY really is incredibly effective against ransomware attacks, as you can see from this video – – but it’s also equally brilliant at counteracting physical threats.
If you’d like a live demonstration contact us and we’ll arrange one for you either live or via zoom.
To ensure your data is completely gone, you need to securely erase your SSD. While this can be done in a variety of ways, traditional third-party services for secure erase come with a series of pain points. this technical blog explores the various solutions for securely wiping sensitive data.
White Papers
This paper highlights just a few of the potential applications for Datakey CryptoAuthentication memory tokens. The functionality described in each use case can be combined or removed to fit a particular application. If you start by asking what features and functions are needed we can help you in developing use cases specific to your application.
Pretty much any embedded system you can think of will utilise some form of removable technology and the options available to the designer have increased – you’re able to choose from a variety of USB flash drives and SD card solutions. Many of these are ‘standard’ and ‘universal’, while others are “non-standard”, abandoning the standard form factors for reasons of robustness or security.
To help you build something that performs its function AND stands the test of time, we’ve put this guide together – to make the process as easy as possible for you.
This white paper gives an introduction to the topic of wireless coexistence of medical devices, including what the FDA has to say about it. It then takes an in-depth look on how to manage multiple instances of the same wireless medical
device in the same proximity. Several options are discussed for linking or pairing of these wireless medical devices