ONEKEY is a specialist for automated security & compliance analysis for OT& IoT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices,
ONEKEY is a leading European specialist in product cybersecurity. The unique combination of an automated security & compliance software analysis platform and consulting services by cybersecurity experts provides fast, comprehensive analysis, and solutions in the area of IoT/OT product cybersecurity. Building upon automatically generated "Digital Twins" and "Software Bill of Materials (SBOM)" of devices, ONEKEY autonomously analyzes firmware for critical security vulnerabilities and compliance violations, all without source code, device, or network access. Vulnerabilities for attacks and security risks are identified in the shortest possible time, and can thus be remediated in a targeted manner. The easy-to-integrate solution enables manufacturers, distributors, and users of IoT technology to quickly and continuously perform 24/7 security and compliance audits throughout the product lifecycle. Leading international companies in Asia, Europe, and America are already successfully benefiting from the ONEKEY platform and experts.
Address
ONEKEY GmbH
Kaiserswerther Str. 45
40477 Duesseldorf
Germany
Phone: +49 211 15874104
Internet: onekey.com
Automated security & compliance from product design to End-of-Life, including binary analyses of IoT firmware, without source code, network, or physical access. Results in minutes - available SaaS or on-premises. Analysis includes automated SBOMs, zero-day vulnerability detection & CVE matching, online cryptographic analysis, information leakage detection &firmware comparison. Compliance checker detects violations of international regulatory standards, i.e. IEC62443, EU Cyber Resilience Act etc.
ONEKEY offers comprehensive security services for products, including SDLC Assessment & Gap Analysis, Threat Modeling, Design & Architecture Review, Security Test Automation, Configuration Review, Source Code Review, Penetration Test, Independent 3rd Party Assessment, Conformity Testing, Firmware Extraction & Decryption, Security Monitoring, & Vulnerability Triage & Mitigation Support. We will assist you throughout the product lifecycle by understanding your threat landscape and attack surface.
Click here if you notice an image that violates copyright or privacy rights.
We only use functionally necessary cookies and the web analysis tool Matomo in order to optimally design and continuously improve our website for you. By continuing to use our website, you agree to this. Further information and an objection possibility can be found here: Data protection