The Non-Intrusive Solution

Enables Integrity-Assessment-as-a-Service

from supply chain to the whole life cycle

Recent exposés on implant-based attacks that infiltrate any part of a supply chain, such as the Bloomberg feature on the Supermicro server board hack in China last year, have gained people’s attention. These attacks, which have no commercially available solution, present a major opportunity for PFP. Our proprietary technology is the non-intrusive, real-time solution to the problem of supply chain tampering.

Screen-Shot-2019-07-19-at-10.52.40-AM

Our Products

P2Scan: Power Analytics

pMon 751: IoT Monitor

eMon: Embedded SDK

Solutions

ics

Iot

supply chain

hardware trojan

Our Partners

Contact Us to request a demo!

MOBILE

The Non-Intrusive Solution

Enables Integrity-Assessment-as-a-Service

from supply chain to the whole life cycle

MOBILE

PFP provides a cloud-based, dynamic power behavior analytics which enables Integrity-Assessment-as-a-Service for many PFP-compatible devices.

These devices collect unintended emission data such as electromagnetic or current, non-contact, over the power line or embedded.

PFP can fingerprint the combination of hardware, firmware and configuration. We use the fingerprint to authenticate, monitor, remediate or prevent malicious attacks such as supply chain, implant, insider tampering, etc.

MOBILE

Our Products

P2Scan: Power Analytics

pMon 751: IoT Monitor

eMon: Embedded SDK

MOBILE

ICS and IoT Solutions

ICS

IOT

supply chain

hardware trojan

MOBILE

Our Partners

MOBILE

Contact Us to request a demo!

Close Menu