Tools & Components

Tools and components for embedded development that make your life as a developer more efficient, fun and stress-free. Logic Technology offers only high-quality embedded software- and hardware tools and components.

View all tools

Knowledge Center: security

Knowledge

Whitepaper – Effective power interruption testing – how best to fail

Download the whitepaper 5 + 9 = * E-mail address * name@company.com Email First name: * Last name * Company * News, product updates and events Yes, keep me posted of the latest embedded news Gevorg Melikdjanjan Security | Reliability | Data Solutions If you...

November 25, 2024
Read more
Exein Team welcomes Gevorg and Logic News

Exein Partners with Logic Technology

Empowering Businesses with Next-Generation Embedded Cybersecurity Solutions Rome, Italy / Wessem, The Netherlands – September 2, 2024 – Exein, a pioneer in embedded security for the Internet of Things (IoT), today announced a strategic partnership with Logic Technology, a leading...

August 30, 2024
Read more
ebook securing embedded systems Knowledge

eBook – Securing embedded & IoT systems

Embedded system security is vital to protect end users and organisations against numerous threats. With the increasing number of cyberattackstargeting embedded systems, ensuring the security of these systems has become more crucial than ever before. One of the main reasons...

June 19, 2024
Read more
embedded iot security Knowledge

6 types of security testing for embedded and IoT systems

    Security testing ensures the robustness and resilience of embedded systems against potential threats and vulnerabilities. As embedded systems become more prevalent in various industries, it is imperative for development teams to be well-versed in the different types of...

June 9, 2024
Read more
embedded and iot security tools Knowledge

4 proven strategies for secure embedded and IoT devices

Rather than merely reacting to threats, product development teams should anticipate and plan for potential vulnerabilities throughout the development process. This includes conducting a comprehensive risk assessment early on, identifying potential attack vectors, and developing mitigation strategies. One effective way...

May 14, 2024
Read more
ebook data management at the edge Knowledge

eBook – Data Management at the Edge

There are important differences between desiging for traditional edge and desiging for Edge AI. In this eBook we dive into these differences, focussing on data management.  

April 16, 2024
Read more