Close
arrow-left-2arrow-left-3arrow-left-4arrow-leftchronodiggdown-arrow--lineardown-arrowearthenvelopefacebookfacebook_ (2)facebook_forward-arrowforwardgooglehomeico-downloadico-linkindustries--1industries--10industries--10_oldindustries--2industries--3industries--4industries--5industries--6industries--6_oldindustries--7industries--8industries--9linkedinmailmarkernewspaperpadlockpage-arrow-leftpage-arrow-rightpage-listpencilpinterestplay-buttonprintersearchsocial-diggsocial-facebooksocial-googlesocial-instagramsocial-linkedinsocial-pinterestsocial-twittersocial-youtubestartelephonetwittertwitter_user

Secure Firmware Update Policy

Marposs Group Policy

Industrial Cyber Security is being increasingly recognized worldwide as a prerequisite for corporate interconnected operations.

Marposs greatly values customer data security, and endeavors to make the firmware updating process as secure as possible on our electronic devices through the use of constantly improved technologies.

From the moment it leaves the developer’s desk, it is important to ensure that the firmware update is authentic and has not been modified by unauthorized parties.

To address security issues effectively, digitally signed firmware updates are required. That is why at Marposs, we are adopting digitally signed and encrypted firmware that uses up-to-date algorithms and takes advantage of the hardware cryptographic functionalities available in modern microcontrollers.

The digital signature has two purposes. Firstly, it authenticates the firmware source, i.e. it shows that the update is an original Marposs product. Secondly, it ensures data integrity by verifying that the update has not been tampered with before the download into the target flash memory.

The firmware encryption offers further protection from external attempts to read the code and unveil our proprietary algorithms and protocols through reverse engineering techniques. We strongly believe that a policy of protecting our know-how is in our customers’ full interests, as it prevents malicious third parties’ efforts to illicitly copy, modify and reinstall our original firmware.

Top Contact us