Nexus Knowledge Centre


Securing your Embedded Memory

Embedded memory must be secured to protect data from unauthorised access, made by hackers with the intent of stealing or corrupting it.  Click above to read our detailed guide to securing your embedded memory.

AI cyber secure SSDs

X-PHY® the World’s First Cyber Secure SSD

SSDs are increasingly popular for storing data, but they open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Find out how this security problem and other issues created by using an embedded SSD can be eliminated by reading our guide.

Published Technical Articles

Embedded… But Exposed

With more and more operational technology systems becoming IoT enabled, the attack surface for cyber-attacks is getting larger. Michael Barrett discusses the threats and solutions.

All Round Protection

For many applications data collected in the field must be stored onto removable memory devices. Michael Barrett, MD of Nexus Industrial Memory, provides guidance on what to look for when selecting a drive for use in harsh environments.

Memory Refresh

Non-volatile memory is used in most embedded systems. The question is : with all the different memory types available, which is the best to use, and why? This question is tackled in this technical blog.

The Key to Successful Firmware Updates

Why rely on consumer USB flash drives and SD cards that aren’t designed for harsh industrial environments? Datakey memory tokens are specifically designed for industrial use, being both rugged and secure. We can also offer IP67-rated panel-mount receptacles for outdoor or wash-down applications.

Technical Blogs

How might an embedded system be attacked?

One key focus for the majority of engineers is Security. And these days it’s even more of a danger, with threats increasing in number and sophistication.

If you design embedded systems, and security is at the forefront of your mind, you’ll find our latest blog useful.  In it we discuss:

  • Exactly how your embedded system might be attacked
  • How IIoT can make embedded systems more vulnerable
  • The two most common types of embedded system attacks
  • Two recent embedded system attacks and what we can learn from them

How to securely erase an SSD

and deliver sustainable embedded cybersecurity

To ensure your data is completely gone, you need to securely erase your SSD.  While this can be done in a variety of ways, traditional third-party services for secure erase come with a series of pain points. this technical blog explores the various solutions for securely wiping sensitive data.

Cyber Safe Removable Memory Devices

There is a security risk inherent in using removable memory devices such as USB Sticks. The wide availability of USB drives makes them attractive to hackers and an ideal vehicle for introducing malware into a company from within its IT Firewall. Read in our technical blog how moving to industrial removable memory devices could make your environment cyber safe

SSD with PLP for Safer Data Storage

Powerloss protection (PLP) protects your local system from experiencing data corruption or loss, in turn reducing the risk of corrupted data being stored.  To get the full story on PLP and decide whether it could be valuable for you, have a read of our technical blog

X-PHY ransomware attack demonstration video

Flexxon X-PHY really is incredibly effective against ransomware attacks, as you can see from this video – but it’s also equally brilliant at counteracting physical threats. 

If you’d like a live demonstration contact us and we’ll arrange one for you either live or via zoom.

“No threat can get past the X-PHY SSD”

Professional Cyber Security expert states “No threat can get past the X-PHY SSD”, read Flexxon’s exclusive interview to find out how the X-PHY fared against rigorous independent testing.

White Papers

Use Cases for Datakey Crypto Authentication™ Token

This paper highlights just a few of the potential applications for Datakey CryptoAuthentication memory tokens. The functionality described in each use case can be combined or removed to fit a particular application. If you start by asking what features and functions are needed we can help you in developing use cases specific to your application.

How to choose the best type of removable memory device

for your embedded system

Pretty much any embedded system you can think of will utilise some form of removable technology and the options available to the designer have increased – you’re able to choose from a variety of USB flash drives and SD card solutions. Many of these are ‘standard’ and ‘universal’, while others are “non-standard”, abandoning the standard form factors for reasons of robustness or security.
To help you build something that performs its function AND stands the test of time, we’ve put this guide together – to make the process as easy as possible for you.

Wireless Coexistance: Pairing Wireless Medical Devices

This white paper gives an introduction to the topic of wireless coexistence of medical devices, including what the FDA has to say about it. It then takes an in-depth look on how to manage multiple instances of the same wireless medical
device in the same proximity. Several options are discussed for linking or pairing of these wireless medical devices

Design Guide For Embedded Systems

Implementing an embedded system with a removable USB flash drive can be a difficult task.
Knowing the key concepts and considerations beforehand can make the job much easier

The Key to Successful Wireless Firmware Updates

What Engineers Need to Know Before Designing IoT Cloud Connected Embedded Systems.

Want to find out more?

We would love to hear from you…

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.