PHYSEC SEAL® Cyber-Physical System Security Platform

Fol­lowing the digi­ta­li­sa­ti­on of devices and assets, a new mar­ket trans­for­ma­ti­on is alrea­dy taking place with the decen­tra­li­sa­ti­on of sys­tems. While data cen­ters that were pre­vious­ly hea­vi­ly guar­ded could gua­ran­tee the secu­ri­ty of pro­duc­tion and ser­ver sys­tems, the­se mecha­nisms are no lon­ger suf­fi­ci­ent for a decen­tra­li­zed infra­st­ruc­tu­re. PHYSEC SEAL® pro­tects your infra­st­ruc­tu­re against cyber-phy­si­cal thre­ats in uncon­troll­ab­le envi­ron­ments. We offer a wide ran­ge of opti­ons for the secu­re moni­to­ring of your infra­st­ruc­tu­re envi­ron­ment. All you need is a mini­mal set­up of our sen­sors to ensu­re phy­si­cal inte­gri­ty.
Our solu­ti­on uses elec­tro­ma­gne­tic waves to crea­te a fin­ger­print of the envi­ron­ment. Phy­si­cal chan­ges, such as unwan­ted tem­pe­ra­tu­re fluc­tua­tions, hard­ware fail­u­res or mani­pu­la­ti­on attempts, alter the elec­tro­ma­gne­tic field so that a com­pa­ri­son with the fin­ger­print leads to reco­gni­ti­on of the chan­ge. A dis­tinc­tion can be made bet­ween chan­ges in zone 2 (out­side the device) and chan­ges in zone 1 (insi­de the device).

We take care of the inte­gri­ty of your hard­ware and detect chan­ges down to 100µm.

So you can trust the hard­ware in the future.

In the future of IoT and edge com­pu­ting, it will be more and more dif­fi­cult to ensu­re that phy­si­cal assets are pro­tec­ted by their ope­ra­tio­nal envi­ron­ment. So we clear­ly see the need for a self-defen­ding sys­tem based on PHYSEC’s inno­va­ti­ve sur­veil­lan­ce tech­no­lo­gy.“
Dr. Kai Mar­ti­us, CTO, secu­n­et AG

Cyber-physical security for decentralized systems

As an IT ser­vice pro­vi­der, you should also incre­a­singly con­si­der the ope­ra­tio­nal secu­ri­ty of your cus­to­mers’ sys­tems. The­re­fo­re we offer you:

  • Ensu­ring pro­duct inte­gri­ty
  • Envi­ron­men­tal pro­tec­tion, com­pa­ra­ble to secu­red data cen­ters
  • Moni­to­ring of the sys­tems
  • Con­nec­tion via encryp­ted LPWAN con­nec­tions

Do not make the secu­ri­ty of your sys­tems depen­dent on their loca­ti­on. Whe­ther in the data cen­ter or in the street cabi­net: With PHYSEC SEAL no one can access your sys­tems unde­tec­ted.

Physical-Layer Security — The core of SEAL

The core of our tech­no­lo­gy is based on the rese­arch area of phy­si­cal lay­er secu­ri­ty, which is also whe­re the ori­gins of our com­pa­ny lie. By com­bi­ning exper­ti­se in com­mu­ni­ca­ti­on tech­no­lo­gy, signal theo­ry and cryp­to­gra­phy, we can detect macro­scopic chan­ges. This novel con­cept also con­vin­ced the MIT and hono­red the CEO Chris­ti­an Zen­ger as Inno­va­tor Under 35 in Euro­pe. More infor­ma­ti­on about the tech­no­lo­gy was also pre­sen­ted at the 35th Cha­os Com­mu­ni­ca­ti­on Con­gress in Leip­zig: Zum Video

Chip with PHYSEC technology

You can retro­fit PHYSEC SEAL into exis­ting solu­ti­ons via hard­ware modu­les, or inte­gra­te the SoC into your pro­duc­tion. Our engi­neers will pro­vi­de you with sup­port during inte­gra­ti­on.

  • Ubi­qui­tous and scala­b­le mul­tipur­po­se sen­sor
  • Mil­li­met­re accu­ra­cy through radar tech­no­lo­gy
  • Ease of inte­gra­ti­on (like acce­le­ro­me­ters, etc.)
  • Soft­ware-defi­ned tuning

Cloud-based service platform

Keep track of your assets and let us alert you whenever sys­tem chan­ges occur.

  • App­li­ca­ti­ons: secu­ri­ty, lia­bi­li­ty, pro­duct pira­cy, main­ten­an­ce, …
  • Soft­ware abs­trac­tion allows hard­ware inde­pen­den­cy
  • learns phy­si­cal sta­te infor­ma­ti­on
  • Real-time assess­ment of 3D phy­si­cal sta­te
  • Pro­vi­des APIs to SIEM, asset mana­ger, etc

Easy API access

As a com­po­nent of IoTree, SEAL can be easi­ly acces­sed via a stan­dar­di­zed API inter­face. Lin­king the phy­si­cal and digi­tal world has never been easier.

  • Clas­si­fi­ca­ti­ons of con­di­ti­ons
  • Inte­gri­ty assess­ment
  • Tem­pe­ra­tu­re and humi­di­ty
  • Error sta­tes
This young Ger­man inno­va­tors show an impres­si­ve com­bi­na­ti­on of entre­pre­neu­ri­al and sci­en­ti­fic-tech­ni­cal skills and are deve­lo­ping a tech­no­lo­gy with the poten­ti­al to impact the world.”
Mah­vash Sid­di­qui, MIT Tech­no­lo­gy Review

There are numerous reasons for good integrity protection:

ISO Compliance

The secu­ri­ty of the ope­ra­ting envi­ron­ment is a cen­tral com­po­nent of ISMS sys­tems, such as ISO/IEC27001. Safe ope­ra­ti­on in an unpro­tec­ted envi­ron­ment is not pos­si­ble without PHYSEC.

Industrial security

Indus­tri­al com­mu­ni­ca­ti­on must be spe­cial­ly pro­tec­ted, as the finan­cial dama­ge cau­sed by inte­gri­ty vio­la­ti­ons can be enor­mous. Our solu­ti­on hel­ps to ope­ra­te cri­ti­cal com­pon­ents, even in remo­te loca­ti­ons.

Laws and standards

The assuran­ce of sys­tem inte­gri­ty is also requi­red by stan­dards and laws. We imple­ment the requi­re­ments of TKG, EnWG and BSI-TR with you.

From cloud to edge

By ope­ra­ting sys­tems as edge nodes ins­tead of in the data cen­ter, the necessa­ry secu­re ope­ra­ting envi­ron­ment is no lon­ger avail­ab­le. Pro­tect your sys­tems against unaut­ho­ri­zed access; no mat­ter whe­re the sys­tem is instal­led.

What we offer you:

  • Moni­to­ring from small devices to lar­ge con­trol cabi­nets and rooms
  • Detec­tion and moni­to­ring ins­tead of cost-inten­si­ve phy­si­cal pro­tec­tion
  • Chan­ges can also be iden­ti­fied after off­line and off­power pha­ses
  • Using an exis­ting net­work struc­tu­re or retrie­ving data via LPWAN
  • Con­nec­tion to exis­ting SIEM sys­tems

System Integrity — For you and your customers

Inte­gra­te our pro­duct into your solu­ti­on port­fo­lio and bene­fit from:

  • A sys­tem-wide inte­gri­ty pro­tec­tion
  • Pre­dic­ti­ve main­ten­an­ce infor­ma­ti­on
  • Reduc­tion of the risk of unde­tec­ted intru­si­ons or sys­tem fail­u­res
  • Low total cost of owners­hip

Our solu­ti­on hel­ps you to moni­tor the ope­ra­ting envi­ron­ment of your sys­tems — easy and secu­re.

Digital description of the physical world

Chan­ges in ope­ra­ting envi­ron­ments are rele­vant in many cases and can pro­vi­de important infor­ma­ti­on not only in the case of an attack:

  • Fail­u­re of mecha­ni­cal com­pon­ents, e.g. non-rota­ting fans
  • Con­trol of instal­led plug con­nec­tions, e.g. in cable dis­tri­bu­ti­on boxes
  • Detec­tion of cli­ma­tic chan­ges, such as tem­pe­ra­tu­re and humi­di­ty
  • Moni­to­ring of legi­ti­ma­te acces­ses, e.g. bank safe depo­sit boxes
  • Iden­ti­fi­ca­ti­on of cor­ro­si­on and soi­ling
  • Detec­tion of unaut­ho­ri­zed ope­nings, e.g. con­trol cabi­nets

Did we spark your interest?

Con­ta­ct us today and order our SEAL Star­ter Kit to eva­lua­te our pro­duct in your own app­li­ca­ti­on. Our engi­neers will assist you to iden­ti­fy the requi­re­ments of your spe­ci­fic app­li­ca­ti­on. Advice and sup­port is our top prio­ri­ty, becau­se we under­stand that every cus­to­mer has dif­fe­rent needs.

Smart Health

The auto­ma­tic pro­ces­sing of health data is advan­cing rapidly. Pro­tect sys­tems in medi­cal cen­ters against unaut­ho­ri­zed access, as in the data cen­ter.

Industry 4.0

Inter­con­nec­ted machi­nes and pro­duc­tion plants requi­re main­tai­ning the inte­gri­ty of the indi­vi­du­al sys­tems. Pro­tect them from unaut­ho­ri­zed access by employees, main­ten­an­ce workers and guests.

Smart Grid

The decen­tra­liz­a­ti­on of the ener­gy grid leads to a hig­her num­ber of grid com­pon­ents. An attack on the­se com­pon­ents can lead to a black-out of the ent­i­re grid. Do not allow this to hap­pen.

Edge Computing

Ser­vers and sys­tems clo­se to the cus­to­mer enab­le lower laten­ci­es and hig­her data rates. Howe­ver, anyo­ne can access your ser­vers if they are pla­ced on the street without addi­tio­nal pro­tec­tion.

Personal consultation

We at PHYSEC will be hap­py to ans­wer your ques­ti­ons.
Talk direct­ly to our exe­cu­ti­ves now.

Dr. Chris­ti­an Zen­ger, CEO
email: christian.zenger@physec.de

Dr. Hei­ko Koep­ke, CFO
email: heiko.koepke@physec.de