Engineering Services

Timesys Platinum Member

Company Logo


Support Information


Timesys TRST Security Services enable you to bring products using embedded Linux and open source software to market faster, without compromising security. Timesys TRST Security Services enable you to address security early in the design of your product and implement security best practices during development, which is key to managing the security of your device throughout its lifecycle. (*) TIMESYS TRST SECURITY SERVICES INCLUDE: • Secure Boot/Chain of Trust — Ensure your device is not running tampered software by verifying its authenticity before execution. Establish software authenticity all the way from the bootloader to user applications. • OTA Software Updates — Our security services can help you determine how to update/deploy software securely and deny unauthorized software installs. • Device Encryption and Secure Key Storage — You can protect IP and sensitive user information by encrypting data/software. It is also critical to protect the key used for encryption using a secure storage mechanism. Additionally, software that handles confidential data should run from within a hardware/software-isolated environment. • Security Audit — By performing a risk analysis, our audit services can help you determine what potential threats your system might encounter and what should be secured. • Hardening — Our hardening service focuses on system configurations needed to reduce your product’s attack surface, decrease risk of compromise, and minimize breach impacts. (*) BENEFITS • Reduce the attack surface of your device — By auditing, hardening, optimizing your software footprint, and implementing secure boot and chain of trust, we improve the security posture of your device. • Reduce performance tradeoffs — By selecting the proper hardware, you can minimize the performance impact of securing it. Timesys has the expertise to help you achieve the lean footprint and lower power consumption you need, even while meeting security requirements. • Reduce time-to-market delays — Through our Security Services, security is baked in at the outset of your development, enabling you to cut the time, rework, and cost overruns that often come with deploying security too late in design.

Services Offered
  • Other Engineering Services
  • Security Services

TI Product Family Experience
  • OMAP-L1x
  • ARM-Based Processor Platforms
Support Information

A list and links to documentation relevant to the solution, including schematics, board layout suggestions.

Sales Contact
Al  Feczko

Technical Support Contact
Al  Feczko

1905 Boulevard of the Allies
Pittsburgh, Pennsylvania
United States

Other Offices
Timesys EMEA
ul. Palmowa 1A
Chyby, 62-081

Timesys Technologies India
3rd Floor, Time Square Building,
Shushant Marg, Sushant Lok I, Sector 43
Gurugram, Haryana
122 009

8153 Elk Grove Boulevard
Suite 20
Elk Grove, California
United States

Timesys Headquarters
1905 Boulevard of the Allies
Pittsburgh, Pennsylvania
United States

Customer Tags Help

No Tags are Available for this Company Name



The information contained herein has been provided by a member of TI's Design Network. This information is provided on the TI website only as a convenience and TI is not responsible for the contents of this page or any changes or updates to the information posted on this page. Certain links provided herein permit you to leave this site and enter non-TI sites. These linked sites are not under TI's control. TI is not responsible for the contents of any linked site or any changes or updates to such sites. TI is providing these links to you only as a convenience. The inclusion of any link does not imply endorsement by TI of any linked site.

TI's Publication of information regarding third-party products or services does not constitute an endorsement regarding the suitability of such products or services or a warranty, representation or endorsement of such products or services, either alone or in combination with any TI product or service.