skip to Main Content
MultiZone Security Is The Quick and Safe Way To Add SecurityFor Arm Cortex-M processorsThe Quick and Safe Way To Add SeparationFor Microchip Atmel SAME70Hardware-enforced Software-defined SecurityFor Renesas EKRA6M3Multiple Equally Secure WorldsFor NXP Semiconductors IMXRT1020The Freedom To Innovate With Untrusted 3rd Party SoftwareBased On Free and Open StandardsFor ST Microelectronics STM32F767Royalty FreeFor GigaDeviceThe First Trusted Execution Environment for RISC-VFor Microchip PolarFire SoCThe First Secure IoT Stack For RISC-VFor AndesThe First Linux Enclave For RISC-VFor Bare Metal ApplicationsFor SiFiveA Breakthrough From Secure / Non-Secure WorldsFor FreeRTOSHigh Availability For Safety Critical SystemsFor LinuxFormally VerifiableFor AdaBuilt From Scratch For RISC-VFor WolfSSLPolicy-DrivenFor picoTCPCompliant With RISC-V Specs 1.10For RISC-V 32-bit rv32i processorsFault TolerantFor 32-bit rv32e processorsReally FastFor RISC-V 64-bit rv64i processorsConfigurable In MinutesFast Time-To-Market for Secure ApplicationsIsolation for Untrusted 3rd Party LibrariesFirmware Supply Chain SecurityThe Safest Way To Port Legacy CodeHardware-enforced Separation of DataFor RISC-V Rocket CoresHardware-enforced Separation of BinariesFor RISC-V PULP CoresThe Culmination of Best Practices in Embedded SecurityHardware-Enforced Boundary for Root Of TrustIsolation Of Open Source LibrariesHardware-Enforced Boundary For Crypto KeysHardware-Enforced Boundary For Crypto LibrariesFor Real Time Operating SystemsHardware-Enforced Boundary for PUFSecure BootRoot Of TrustHardware-Enforced Separation of SoC PeripheralsProperly Implemented Memory ProtectionCompletely Self-ContainedCompiler and Library AgnosticCost EffectiveSecurity Retrofit For Existing ApplicationsFor Mixed-Criticality Systems

What MultiZone Security Can Do For You

High Security Separation

Hardware-enforced, software-defined separation of multiple trusted execution environments to shield critical functionality from untrusted components. Completely self-contained, zero dependencies from libraries, compiler and linker. Extremely small attack surface. Formally verifiable.

Quick And Safe

Encapsulates and hides the complexity of  the underlying hardware security blocks. The only interaction between the developer and the trusted execution environment is a simple policy definition file. No coding or security expertise are required.

No System Redesign

Retrofits existing RISC-V and Arm Cortex-M processors. If you don’t have TrustZone, or if you require finer granularity than one secure world, you can take advantage of high security separation without the need for hardware and software redesign.

Why Hex Five?

MultiZone Security is the quick and safe way to add security and separation to your embedded systems. MultiZone software can retrofit existing designs. If you don’t have TrustZone®, or if you require finer granularity than one secure area, you can take advantage of high security separation without the need for hardware and software redesign, eliminating the complexity associated with managing a hybrid hardware/software security scheme.

Securing embedded applications has become increasingly difficult as complex new requirements are often met with the addition of readily available third party components that cannot always be trusted. Legacy designs lack the physical resources to provide the necessary separation, thus leading to larger attack surface and increased likelihood of vulnerability. To shield critical functionality from untrusted third-party components, MultiZone provides hardware-enforced, software-defined separation of multiple trusted execution environments. Unlike traditional solutions, MultiZone is self-contained, presents an extremely small attack surface, and it is policy driven, meaning that no coding is required – or in fact even allowed.

MultiZone enables the freedom to innovate with multi sourced components like open source software, third-party libraries, and legacy binaries that can be configured in minutes to achieve an unprecedented level of safety and security.

Back To Top