Skip Navigation

THE WORLD’S ONLY SOFTWARE TRUSTED EXECUTION ENVIRONMENT (sTEETM)

Our device independent platform enables large enterprises to easily deploy and manage their devices and mobile application to millions of consumers.

THE WORLD’S ONLY SOFTWARE TRUSTED EXECUTION ENVIRONMENT

Our device independent platform enables large enterprises to easily deploy and manage their devices and mobile application to millions of consumers.

Request Demo
01

Protect

Identify the secure parts

Identify any sensitive data, logic, and/or function that needs to be secured within your company’s device and/or mobile application.

02

Integrate

THE CUBE – EMBEDDED TRUST

Your sensitive information is then securely stored in our Software Trusted Execution Environment (sTEETM) running in the background of your device and/or application. This Cube is instantiated only when called upon and runs in a separate micro OS that keeps your data isolated and secure.

03

Deploy

Send to your devices

Deployment of these Cubes is easy and intuitive – simply integrate them into your next release with just 4 API calls. Management of device identity and any keys/credentials is accomplished through the microApps located within the Cubes.

04

Control

Manage IoT security

Management of the Cubes is even simpler: due to MagicCube’s Over-The-Air (OTA) capability, any needed response is immediate through our miniCloudTM management portal. This achieves real-time visibility with no redeployment necessary

The best option

MagicCube’s platform is the best of both worlds, merging the flexibility of software with the security of hardware.

Software

  • Stitched-together, fragmented solutions
  • Difficult to implement
  • Needs a separate risk management solution
  • Lack ubiquitous on-device protection
MagicCube
  • Ubiquity & scalability
  • Security
  • Ease of deployment
  • Ease of management
Contact Us

Hardware

  • More parts means more complex & more expensive
  • Device-specific integration resulting in delayed market release
  • Risking data to a third party

Software

  • Stitched-together, fragmented solutions
  • Difficult to implement
  • Needs a separate risk management solution
  • Lack ubiquitous on-device protection
  • Ubiquity & scalability
  • Security
  • Ease of deployment
  • Ease of management
Contact Us

Hardware

  • More parts means more complex & more expensive
  • Device-specific integration resulting in delayed market release
  • Risking data to a third party

IoT Applications