Timesys TRST (Threat Resistance Security Technology) Product Protection Solutions

Compatible Architectures: NXP i.MX, NXP Layerscape, TI Sitara AM, Qualcomm Snapdragon, Microchip SAMA5, Renesas RZ, Xilinx ZYNQ, Altera SoC

Secure by design + Stay Secure = Your best defense against security threats
Implementing security early in the design of your IoT, IIoT or other device based on open source embedded Linux is key to managing the security of the device. And by continuously monitoring and updating your customized software, you can minimize security threats throughout its lifecycle.

Timesys TRST Product Protection Solutions offer complete end-to-end embedded system security, enabling you to bring more secure devices and other products to market faster. Now you can address security early in the design of your products and more efficiently manage and maintain your device’s security posture throughout its lifecycle.

Reduce time-to-market delays
Through our TRST Secure by Design Services, security is baked in at the outset of your embedded Linux development, enabling you to cut the time, rework, and cost overruns that often come with deploying security too late in design.

Minimize the chance of your software being compromised
Our TRST Stay Secure offering helps you to cut through the vulnerability storm and identify, analyze and respond to known security issues in the quickest time possible.

Establish and maintain the strongest security posture for your embedded systems
Our Timesys TRST Product Protection Solutions are easily adaptable, so you can tailor a solution that best fits your customers’ unique security requirements.


  • Secure Boot/Chain of Trust and OTA Software Updates — Establish software authenticity from the bootloader to user applications, update/deploy software security, and deny unauthorized software installs
  • Device Encryption and Secure Key Storage — Protect IP and sensitive user information by encrypting data/software and also protect the key used for encryption
  • Security Audit and Device Hardening — Determine potential threats your system might encounter, what should be secured to reduce your product’s attack surface, decrease risk of compromise, and minimize breach impacts
  • Security Vulnerability and Patch Notification — Eliminate the time spent monitoring CVEs, assessing their risks, and selectively apply updates & security patches into your software
  • BSP Lifecycle Maintenance — Cut long-term maintenance costs associated with keeping your product line updated and secure by up to 60%


  • Verified bootloader (NXP i.MX, Qualcomm® Snapdragon™, TI Sitara, Microchip SAMA5, Xilinx® ZYNQ®, and more)
  • Key management and secure key storage using Trusted Platform Module (TPM) or Trusted Execution Environment (TEE) using Arm® TrustZone® and OP-TEE
  • Security vulnerability monitoring and notification for Yocto Project, Timesys Factory, Buildroot, and PetaLinux
  • BSP Lifecycle maintenance includes two BSP upgrades per year including minor Linux kernel version upgrades for security and bug fixes
  • Over-the-air (OTA) software update and device management cloud integration with AWS IoT and Microsoft® Azure

IoT gateways and devices, medical devices, industrial automation, and networking

Immediate availability

Contact Information


1905 Boulvard of the Allies
Pittsburgh, PA, 15219

tele: 412.232.3250
toll-free: 866.392.4897
fax: 412.232.0655

Extension Media websites place cookies on your device to give you the best user experience. By using our websites, you agree to placement of these cookies and to our Privacy Policy. Please click here to accept.