Design the most secure version of your IoT product
IoT security must be central to the design of each product and every stage of your project.

Security by design
We incorporate the security aspect from the earliest product design stage
Smart object security at every stage of the IoT pathway
Analyse
Identify the risks that threaten your solution and define the appropriate security level.
Evaluate
Find out how robust your product or solution is and detect any security vulnerabilities.
SECURE
Adjust your product to the desired level of security.
Monitor
Guarantee that your solution remains free from vulnerabilities over time.
Security priorities integrated into projects

Sterilor
for treating swimming pool water.
Analysis and proposal of a secure IoT architecture
Device control via a mobile app
Real-time data reporting

Cybersecurity research work
Rtone can combine applied research with engineering to design a secure connected solution. We incorporate the latest advances in cybersecurity and privacy into every stage of the IoT pathway across all our activities.
Five stages in securing your smart product
Analysis
Risk analysis
Risk matrix
Evaluation
Preliminary diagnostic: hardware, software, wireless communication, mobile and cloud
Security level based on international standards (OWASP ASVS)
GDPR compliance
Penetration testing
Level 1: Standard tests targeting specific vulnerabilities.
Level 2: Hacking the product.
Deployment
Supporting the hardware, firmware and software teams
Complete approach: development, supervision, reviews, tests etc.
Monitoring
Specific: monitoring the latest vulnerabilities, generating alerts
IoT security training
Security at the heart of our work
Rtone, a contributor to the Paclido project, is committed to security
Our aims:
- Develop lightweight encryption algorithms and protocols for IoT
- Develop a detection system for attacks targeting IoT
- Uses in home automation, smart city, industry 4.0
- Algorithms submitted at the end of 2018 to the NIST LWC standardisation competition
- Deployment planned for public lighting in Saint Quentin en Yvelines in late 2020
Lightweight
Cryptographic Protocols and Algorithms for
the Internet of Things
With the support of
I have a smart object project
Countering security flaws in connected objects
Many people underestimate the risks of intrusion, hacking and ransomware.
And yet these risks can be prevented with simple actions:
- Anticipation, based on the principle of Security by Design
- Testing the security of your connected object
To find out more,
> Read the article (french)
Our other skills