Beyond stories


09 Jan 2018

A pioneering approach to wearable security

Millions of people use connected wearable devices to track their activity, health, location, and more. This generates an enormous volume of sensitive data. Protecting it and ensuring its integrity must be the number one priority for any wearable maker.


But with so many components, technology layers, and attack surfaces, wearable security is incredibly complex. Getting it right requires a big-picture approach, which is why we’ve distilled our 20+ years of cybersecurity expertise into an easy-to-follow five-pillar plan for wearables.

Our end-to-end approach helps designers and engineers create wearables customers can trust.

Our five pillars of wearable security at a glance:

  1. Prevent your device from running unauthorized or malicious code – and if anything does slip through the net, make sure you have a way of rolling back to the last approved version.
  2. Encrypt all communications between your device and the outside world.
  3. Lock down the interfaces on your device, including testing and debug ports – leaving these open is inviting trouble.
  4. Make sure access to APIs is strictly controlled to prevent unauthorized use of device features.
  5. Many wearables rely on data from external devices, such as location sensors. If this external kit is compromised, your wearable device must be able to detect and handle this without compromising data security or integrity.

The importance of digital trust

Packed full of sensitive data and connected to the outside world, wearables make an attractive target for cybercriminals. Anyone who uses them puts huge amounts of trust in the manufacturer and service provider.

Even one small security breach could cause catastrophic damage to a wearable maker.

Don’t run the risk of that being you. Discover more about our five-pillar wearable security approach today.

You might also be interested in