Nexus Knowledge Centre


AI cyber secure SSDs

X-PHY® the World’s First Cyber Secure SSD

SSDs are increasingly popular for storing data, but they open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Find out how this security problem and other issues created by using an embedded SSD can be eliminated by reading our guide.

What Is NAND Memory?

NAND flash is a common type of non-volatile memory (NVM). Unlike a volatile memory type, such as DRAM, NAND flash retains data when power is removed and so has many applications. But what is NAND memory and how does it work? In this guide we will explore everything you need to know.

What Is NAND flash memory used for?

This popular memory type is architecturally optimized for high-density data storage. There are two grades of NAND, consumer and industrial – with the latter having an operating temperature of -40 to 85oC and suitable for harsh environment applications.  Consumer grade, which has an operating temperature of 0 to 70oC, is typically found in consumer electronics, and we’ll discuss both types in this guide.

Published Technical Articles

Protecting IIoT devices from cyber attacks

Unsurprisingly, plenty of governments, organisations and companies are considering afresh what they can do to bolster their cybersecurity, in light of the very real threat of hacking and cyberattacks.

With that in mind, we’d like to direct you to a recent article of ours published in Electronics World – Protecting IIoT devices from cyberattacks

Embedded… but exposed

With more and more operational technology systems becoming IoT enabled, the attack surface for cyber-attacks is getting larger. Michael Barrett discusses the threats and solutions.

All Round Protection

For many applications data collected in the field must be stored onto removable memory devices. Michael Barrett, MD of Nexus Industrial Memory, provides guidance on what to look for when selecting a drive for use in harsh environments

Memory Refresh

Non-volatile memory is used in most embedded systems. The question is : with all the different memory types available, which is the best to use, and why? This question is tackled in this technical blog.

Camellia Chan, CEO and Founder of our manufacturing partner Flexxon, recently spoke with Global Military Communications Magazine about how defence strategies have evolved from the physical to the digital and how adopting a zero trust framework with the support of AI can help governments and organisations alike defend against cyberattacks.

Technical Blogs

How Secure Is Your Data?

Embedded systems designers, know sensitive data resides in embedded memory. At the start of any design you should ask yourself ‘How Secure Is My Data?’ The process of securing embedded memory starts with understanding how data might be at risk, and that’s what we’re going to discuss in this blog.

Why use NVMe SSD?

The NVMe Standard in PCIe has increased the performance efficiency of SSDs. In this blog we answer the question ‘Why Use NVMe SSD?

Next level data security with hardware key

Flexxon, announces the launch of its latest security product, Xsign. Now available globally, the Xsign provides enhanced security through an innovative approach to unlocking sensitive data reserved only for authorised personnel.

How To Secure Embedded Memory

In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined how embedded memory might be attacked and offered some simple solutions. Now, it’s time to discuss how to secure embedded…

How might an embedded system be attacked?

One key focus for the majority of engineers is Security. And these days it’s even more of a danger, with threats increasing in number and sophistication.

If you design embedded systems, and security is at the forefront of your mind, you’ll find our latest blog useful.  In it we discuss:

  • Exactly how your embedded system might be attacked
  • How IIoT can make embedded systems more vulnerable
  • The two most common types of embedded system attacks
  • Two recent embedded system attacks and what we can learn from them

Security challenges for embedded memory

In an previous blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at the engineering level, there are other methods of attack which are harder to thwart. Also, the bigger picture of implementing which is discussed here.

Cyber Safe Removable Memory Devices

There is a security risk inherent in using removable memory devices such as USB Sticks. The wide availability of USB drives makes them attractive to hackers and an ideal vehicle for introducing malware into a company from within its IT Firewall. Read in our technical blog how moving to industrial removable memory devices could make your environment cyber safe

SSD with PLP for Safer Data Storage

Powerloss protection (PLP) protects your local system from experiencing data corruption or loss, in turn reducing the risk of corrupted data being stored.  To get the full story on PLP and decide whether it could be valuable for you, have a read of our technical blog

X-PHY ransomware attack demonstration video

Flexxon X-PHY really is incredibly effective against ransomware attacks, as you can see from this video – but it’s also equally brilliant at counteracting physical threats. 

If you’d like a live demonstration contact us and we’ll arrange one for you either live or via zoom.

How To Secure Erase An SSD

To ensure your data is completely gone, you need to securely erase your SSD.  While this can be done in a variety of ways, traditional third-party services for secure erase come with a series of pain points. this technical blog explores the various solutions for securely wiping sensitive data.

No threat can get past the X-PHY SSD

Professional Cyber Security expert states “No threat can get past the X-PHY SSD”, read Flexxon’s exclusive interview to find out how the X-PHY fared against rigorous independent testing.

White Papers

Use Cases for Datakey Crypto Authentication™ Token

This paper highlights just a few of the potential applications for Datakey CryptoAuthentication memory tokens. The functionality described in each use case can be combined or removed to fit a particular application. If you start by asking what features and functions are needed we can help you in developing use cases specific to your application.

How to choose the best type of removable memory device

for your embedded system

Pretty much any embedded system you can think of will utilise some form of removable technology and the options available to the designer have increased – you’re able to choose from a variety of USB flash drives and SD card solutions. Many of these are ‘standard’ and ‘universal’, while others are “non-standard”, abandoning the standard form factors for reasons of robustness or security.
To help you build something that performs its function AND stands the test of time, we’ve put this guide together – to make the process as easy as possible for you.

Wireless Coexistance: Pairing Wireless Medical Devices

This white paper gives an introduction to the topic of wireless coexistence of medical devices, including what the FDA has to say about it. It then takes an in-depth look on how to manage multiple instances of the same wireless medical
device in the same proximity. Several options are discussed for linking or pairing of these wireless medical devices

Design Guide For Embedded Systems

Implementing an embedded system with a removable USB flash drive can be a difficult task.
Knowing the key concepts and considerations beforehand can make the job much easier

The Key to Successful Wireless Firmware Updates

What Engineers Need to Know Before Designing IoT Cloud Connected Embedded Systems.

Case Studies

Custom Datakey Feature Key Enhances Flexibility for Delta Computer Systems

Have you ever found yourself needing to securely store configuration data and ensure that it’s not altered, duplicated or deleted without permission?

That’s exactly the problem Delta Computer Systems needed to solve.

How did they do it?  Enter Datakey CryptoAuthentication.

How a coffee machine inspired improved railway signalling technology

Klix coffee machines use a Datakey memory key to create individual accounts for every user, so they can buy their coffee cash-free! This application inspired our customer Bombardier to use the same technology for their railway signalling systems. How? Find out in our case study

Want to find out more?

We would love to hear from you…

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.