Secure software libraries

Our products are based on Trusted Objects Secure Software Platform designed to meet market requirements for constrained applications like IoT: strong security, low power consumption, easy connectivity, seamless integration and more.

Trusted Objects to-protect are lightweight secure software libraries targeted for IoT devices, running on generic MCU (ARM Cortex, RISC V…) and enabling security functions, secure storage and secure connectivity.

Information about to-protect is available in our video


to-protect offers many benefits:

  • Easy to integrate on-device Root-of-Trust ,

  • Prevention against logical and physical security attacks on IoT devices exposed to threats, 

  • Fully integrated in several IoT chains to achieve a Chain of Trust,

  • Reference design already qualified,

  • Compatible with existing hardware (no redesign / no impact on the BOM),

  • Easy security retrofit for devices already in the field with MCU FUOTA (Firmware-Update-Over-The-Air).


to-protect supports different security functions such as authentication, data transfer integrity and data transfer confidentiality, secure storage, Intellectual Property protection, secure boot and secure firmware update.


It provides a highly secure implementation of cryptographic libraries, security protocols, connectivity features and secure key storage. to-protect includes software security countermeasures, easy-to-integrate connectivity security, reduced code size and fast execution. 


to-protect is delivered with reference design and with integration examples in several IoT chains, such as: 

  • to-protect LoRaWAN providing augmented security to LoRaWAN end-node device, with a device-to-AWS cloud integration,

  • to-protect TLS/DTLS providing a highly secure implementation of the TLS/DTLS protocols, with a device-to-AWS cloud integration.


All our secure products have a common API, so developers can easily switch from one implementation to another.

toprotect-logo 2