Services
Assessments and Recommendations
- Risk Assessment and Threat Modeling
- We will work with you to analyze assets, policies, and procedures in
your methodologies and work products, and then quantify and convey what is at risk and
how it is threatened. A clear and comprehensive view is essential for understanding
and planning.
- Analysis of Mitigations
- With a clear picture of your current state, risks, and vulnerabilities, options for mitigating those risks
and eliminating the vulnerabilities can be identified. We will present options with insights such as cost vs. benefit of each
(including up-front and long-term costs), and help guide you to the correct solution for your specific needs.
- Architecture review
- If you are developing a product, its design and implementation must be solid and robust -- the future of your company
depends on it being secure and reliable. We work with you to analyze your hardware and software architecture, and further into
its design, coding, manufacturing, deployment, provisioning, updates, and operations.
- Recovery Plans
- A good security strategy acknowledges that attacks may still happen despite mitigation mechanisms and
sound practices, and therefore the recovery from potential attacks is a fundamental responsibility. We help you plan for
quick recovery of all key assets, so that your losses and downtime are minimized.
- Audits and Controls
- Whether required by regulation or not, the ability to measure and verify the implementation of policies and
procedures is necessary for proper management. We will guide you through instrumenting your practices so that
reliable and accurate records are made, and that checks are done to ensure alignment.
- Organization, Process, and Skill Assessment
- Your people are the most important part of the company -- literally its lifeblood. Good outcomes stem from
smart people, being good at what they do, engaging with each other via effective processes to produce the
envisioned product and service. We can help you identify where process improvement or training can help your team work more
effectively.
Design and Development Support
We design and develop secure system and application software for microcontroller and
SoC platforms, spanning board bring-up through development, hardening, testing, validation, and deployment.
- Data and communications encryption
- Code and payload signing and validation; secure boot
- certificate/key management
- Performance Analysis and Optimization
- Debugging
- Development, Testing, and QA automation (CI/CD)
- Code Review
- Penetration Testing
- Education and Training
With over a decade of experience completing multiple projects to commercial production
we stand ready to help you realize your vision for your product.
Custom Development Services
E-Planit Systems, Inc. provides insightful and thorough analysis of the
security of your information systems. We help you see circumstances in your systems' designs,
configurations, and/or deployments and operational practices that create vulnerabilities.
Then, we help you understand your options for making changes, improvements, or adaptations -ones that are appropriate for your needs.
- Bootloader customization and extension
- Secure Boot
- Kernel (Linux) customization and extension
- Platform Security, secure provisioning, over-the-air (OTA) updating
- Android® Application Framework extension, adaptation, and optimization
- Identity and Access Management integrations and complete solutions
- Authentication and Authorization systems integration and implementation
"Android" is a trademark of Google LLC.
Copyright © 2020-2024 E-Planit Systems, Inc. All Rights Reserved.