Guides
SSDs are increasingly popular for storing data, but they open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Find out how this security problem and other issues created by using an embedded SSD can be eliminated by reading our guide.
NAND flash is a common type of non-volatile memory (NVM). Unlike a volatile memory type, such as DRAM, NAND flash retains data when power is removed and so has many applications. But what is NAND memory and how does it work? In this guide we will explore everything you need to know.
This popular memory type is architecturally optimized for high-density data storage. There are two grades of NAND, consumer and industrial – with the latter having an operating temperature of -40 to 85oC and suitable for harsh environment applications. Consumer grade, which has an operating temperature of 0 to 70oC, is typically found in consumer electronics, and we’ll discuss both types in this guide.
Published Technical Articles
Unsurprisingly, plenty of governments, organisations and companies are considering afresh what they can do to bolster their cybersecurity, in light of the very real threat of hacking and cyberattacks.
With that in mind, we’d like to direct you to a recent article of ours published in Electronics World – Protecting IIoT devices from cyberattacks
Camellia Chan, CEO and Founder of our manufacturing partner Flexxon, recently spoke with Global Military Communications Magazine about how defence strategies have evolved from the physical to the digital and how adopting a zero trust framework with the support of AI can help governments and organisations alike defend against cyberattacks.
Technical Blogs
There is a security risk inherent in using removable memory devices such as USB Sticks. The wide availability of USB drives makes them attractive to hackers and an ideal vehicle for introducing malware into a company from within its IT Firewall. Read in our technical blog how moving to industrial removable memory devices could make your environment cyber safe
Powerloss protection (PLP) protects your local system from experiencing data corruption or loss, in turn reducing the risk of corrupted data being stored. To get the full story on PLP and decide whether it could be valuable for you, have a read of our technical blog
Flexxon X-PHY really is incredibly effective against ransomware attacks, as you can see from this video – – but it’s also equally brilliant at counteracting physical threats.
If you’d like a live demonstration contact us and we’ll arrange one for you either live or via zoom.
To ensure your data is completely gone, you need to securely erase your SSD. While this can be done in a variety of ways, traditional third-party services for secure erase come with a series of pain points. this technical blog explores the various solutions for securely wiping sensitive data.
White Papers
This paper highlights just a few of the potential applications for Datakey CryptoAuthentication memory tokens. The functionality described in each use case can be combined or removed to fit a particular application. If you start by asking what features and functions are needed we can help you in developing use cases specific to your application.
Pretty much any embedded system you can think of will utilise some form of removable technology and the options available to the designer have increased – you’re able to choose from a variety of USB flash drives and SD card solutions. Many of these are ‘standard’ and ‘universal’, while others are “non-standard”, abandoning the standard form factors for reasons of robustness or security.
To help you build something that performs its function AND stands the test of time, we’ve put this guide together – to make the process as easy as possible for you.
This white paper gives an introduction to the topic of wireless coexistence of medical devices, including what the FDA has to say about it. It then takes an in-depth look on how to manage multiple instances of the same wireless medical
device in the same proximity. Several options are discussed for linking or pairing of these wireless medical devices
Case Studies
Custom Datakey Feature Key Enhances Flexibility for Delta Computer Systems
Have you ever found yourself needing to securely store configuration data and ensure that it’s not altered, duplicated or deleted without permission?
That’s exactly the problem Delta Computer Systems needed to solve.
How did they do it? Enter Datakey CryptoAuthentication.
Klix coffee machines use a Datakey memory key to create individual accounts for every user, so they can buy their coffee cash-free! This application inspired our customer Bombardier to use the same technology for their railway signalling systems. How? Find out in our case study