The Qt Company and Inside Secure to Offer Joint Integrated Solutions for Creating Secure IoT and Embedded Devices

The Qt Company and Inside Secure to Offer Joint Integrated Solutions for Creating Secure IoT and Embedded Devices

Inside Secure Offers Qt Customers Simple, Yet Powerful Tools to Block Hackers from Gaining Access to Their Devices.

Inside Secure today announced its collaboration with The Qt Company, a global software company with the leading independent technology behind millions of devices and applications, to provide a pre-integrated solution of Inside Secure’s Application Protection product and the Qt Software Framework.

Qt is the platform of choice for in-vehicle systems, medical devices, industrial automation devices, and other business critical application manufacturers. Inside Secure’s Code Protection and Whitebox tools are now integrated within the Qt software development framework – the industry’s first-ever such integration – to powerfully protect IoT devices and the associated sensitive data.

Security of connected devices and their sensitive data in the IoT world is a highly critical aspect for both the developers as well as the end users of these devices making it a top priority for our customers,” said Tuukka Ahoniemi, Senior Vice President, Strategy at the Qt company.

“By integrating Inside Secure’s technology, we can provide our customers an immediate but customizable out-of-the-box solution for addressing their security needs with Inside Secure’s expertise as a proven security pioneer.”

“Inside Secure is pleased to announce its integration with The Qt Company, as the two companies aim to simplify Qt customers’ security software development, improve time to market and reduce overall costs,” said Asaf Ashkenazi, vice president of product strategy at Inside Secure.

“It is imperative for IoT developers to guard against hackers who have an ever-increasing affinity for IoT and embedded targets – and Inside Secure offers an easy path to protection while also increasing the breadth of devices and applications that can actually be secured.”

Related posts

X