IAR Embedded Trust

Secure your code, applications, and devices right from the start by simplifying embedded security with the Root of Trust.

01

Authenticity

We verify authorized software code and application installation to protect your IPs from the root and ensure the cryptographic methods are applied to your chips and devices. You will have the Root of Trust quickly.

02

Active IP protection

We promise critical key management to lock your applications onto authorized devices, providing secured applications and devices access right from the boot process.

03

Anti-cloning

We support unique identification for software applications and device hardware, preventing counterfeits and encrypting your manufacturing.

04

Anti-rollback

We manage your software update processes to provide protection against roll-back attacks and versioning threats.

Product overview

With the complete embedded security features, IAR Embedded Trust meets your demands to protect software and devices once you power on the booting system. You will implement industry-leading security solutions and achieve security compliance quickly.

Features and highlights

IAR's approach to tackling embedded security vulnerabilities

Discover how IAR addresses embedded security vulnerabilities in this informative infographic. Learn about the key features and benefits of their Late-Stage Embedded Security solution, designed to provide comprehensive protection for embedded systems. 

Download infographic
info-graphic-security.jpg

Potential security issues in your development processes and products

screenshot-2023-04-12.png

The value delivered by IAR

1

Cost efficient solution

Developers can enable security and get the whole software and hardware solution to build embedded security with limited budget .

2

Reduce the development time

Developers do not need to design a security implementation on their own, saving time.

3

Secure manufacturing with zero-trust

Device brands can secure all programming processes even if they choose zero-trust manufacturers to execute device provisioning.

4

Modifiable source code delivery

Developers receive the complete source code for the Secure Boot Manager to use, modify and customize. They can see and monitor everything in the boot process.

5

Easy application migration

Developers can simply port the original code and applications onto various chip platforms, reducing development time and enabling high compatibility benefits.

6

Reuse code to ease development process via Secure Application Maker tool

Developers can port their already- written code and applications into embedded security solutions to work with the Secure Boot Manager, reducing development time and enabling a faster time to market. This includes software built using non-IAR toolchains.

Webinar

On-Demand Webinars: Embedded Security Series

Register for our on-demand webinars to build your end-to-end embedded security for your devices.

 

Webinar 1: Authenticity

How to ensure product ownership and integrity 

 

Webinar 2: Active IP protection

Stopping reverse engineering from the root 

 

Webinar 3: Anti-rollback

Avoiding the dangers of outdated firmware

 

Webinar 4: Anti-cloning

Preventing the risk of unwanted product copies 

Explore all our webinars
1-kopiera.jpg

Providing a robust secure bootloader to solve your major security risks

engineers.png

Developers can build a secure bootloader with IAR Secure Boot Manager to achieve embedded security right from the start of the boot processes, preventing major security risks.

 

Our soluitons offer:

  • Root of Trust: Unique device information and trusted functions to ensure the device is operating as designed and has not been interfered with
  • Reduced development time: Easily port your current design to new devices and reuse your code
  • Legislation compliance: Build secure products to meet the requirements and sell to different geographies

 

Providing secure software update to protect data

Enable protection of your software update processes, protecting data, tackling various security vulnerabilities.

 

We strive to:

  • Authenticate applications and devices
  • Encrypt code to protect your IP
  • Update your firmware securely
  • Help you stay compliant with security legislation
adobestock_386832865-1-1.jpeg

Customizing your needs

We provide 3 product editions for IAR Embedded Trust, customizing your needs

Supported devices

Our security tools and services offer support for a wide range of devices, including Arm-based MCUs from STMicroelectronics, Renesas, NXP, Microchip, Silicon Labs, Nordic and Infineon*, as well as the Renesas RX MCU family devices, enabling you to choose the right MCU for the security and functional needs of your application. In addition, support for the vast majority of MCUs can be achieved through the use of Hardware Abstraction Layer (HAL).

*Contact us for details on the Infineon device support included in IAR Embedded Secure IP

The device families in the list are ported and tested by us. Notice that some specific device variants might not have been tested.

We are constantly updating our growing list of supported devices. If your device is not listed here, contact us to find out when your device will be supported.

 

STMicroelectronics Renesas Microchip NXP Silicon Labs Nordic

STM32F4x

STM32F7x

STM32G0C1xE

STM32G474xE

STM32H7x

STM32L4x

STM32L5x

STM32U5x

STM32WB5x

RA2xx

(RA2L1)

RA4Mx (RA4M2)

RA6Mx (RA6M3)

RX6xx (65N/66T)

RX7xx (72M/72N/72T)

 

SAML11

PIC32CM5164LSx0

K2x

K6x

KV5x

LPC55x

i.MXRT10x4

EFM32xG22

EFR32xG23

NRF52840

 

End-to-end embedded security

IAR Secure Deploy are complementary tools to combine with IAR Embedded Trust and IAR Embedded Secure IP to achieve production stage security and secure global production processes with flexible cost-saving at your terms.

Learn more about IAR Secure Deploy
adobestock_363948837-1.jpeg

Want to know more?

We are present worldwide to help you wherever you are, and we are happy to answer any questions you might have about our products.

Get quote

Want to use this product in your development projects? Our sales team is here to guide you to the right solution. Complete this form, and we will get back to you with a price quote tailored to your needs.

* read our Privacy policy

We do no longer support Internet Explorer. To get the best experience of iar.com, we recommend upgrading to a modern browser such as Chrome or Edge.