Home > Markets
ONE DAY SECURITY WILL BE WORTH MORE THAN DEVICES.
Check out our main markets.
IC Design HOUSES
Certification LABS
Automotive
Autonomous cars are the future of automotive. Today, connected vehicles have already tremendously changed our ways of driving and usages of them. After years of automotive’ safety improvements, the time has come for a rise in cars’ connectivity to bring additional safety, comfort and ergonomy in the vehicles. Communication networks…
AIoT & Industry
AIoT is at the heart of the technological disruptive force, AI and IoT have revolutionized and transformed how the world interacts. Combining the two into Artificial Intelligence of Things allows to create devices which can make proactive, intelligent and accurate decisions without human involvement. This type of technology will be…
eHealth
eHealth is the transfer of health resources and health care by electronic means enabled by communications technology through extensive information sharing and collaboration. Given the sensitive nature of medical information as well as healthcare professionals’ high degree of dependence on reliable records, issues of integrity, security, privacy and confidentiality are…
Defense & Industry
The concern for cybersecurity has been constantly growing for governments and public actors during the last decade. As technology improves more and more, so does the security issues that arise from multiple application fields such as identity, evaluation and defense. Governments and other cyber defense actors have high expectations in…
Identity
Experience has taught us that a strong identity security is the baseline for a secure IT infrastructure. The challenge is to control the flow of information to allow easy access for the right people while keeping the wrong ones out. A compromised user identity can be devastating – especially when…
Payments & Transactions
Mobility has now come into payment. While magnetic stripe is bound to extinction and mobile devices are coming closer to customers’ banking account, a mandatory condition for new payment devices to be adopted is the confidence of users in the security of their transactions. Standards and norms (such as PCI…
Memory & Storage
Changes to the memory business due to industry consolidation has led to a more stable supplier landscape. But manufacturers are seeking other opportunities for future growth in light of a maturing mobile market. New areas of expansion include automotive connectivity and smart devices that require reliable memory to process and…
Media & Entertainment
Security and trust in the Media need to be reloaded. Millions of dollars of revenue are lost every year by Studios because of piracy and premium content theft. With the emergence of enhanced premium content such as 4K Ultra HD and HDR (high dynamic Range), Hollywood studios require new security…
Smart Grid
Smart Grids are electrical grids that are partnered with new communication and information technologies in order to provide equilibrium between electricity supply and demand at any moment and provide safe, competitive and durable electricity to consumers. On the other hand, having the electrical grid linked to new information technologies increases…
Consumer Electronics
A change in lifestyle preferences and a growing trend towards using smart electronic devices are the primary factors driving the growth of consumer electronics. But as consumers purchase more and more connected devices to wear, for their leisure or for their home, so increase the risks about security and privacy….
Edge & Cloud
Cloud services have been the go-to option for consumers and businesses for many years, mainly due to the ease of access it offers. On the other hand, there have been frequent and recent security and privacy breaches on cloud storage. Leaving many people without answer about the relevance of utilizing…
Trusted Computing
Trusted computing is a term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and software modifications. It is made to develop and promote specifications for the protection of computer resources from threats without infringing on the rights of end users. There are four main…