Secure Compute Solutions

that protects your valuable assets from real world exploits

that protects your software, data and credentials from real world exploits

that protects your software, data and credentials

Built to protect your software, data and credentials

Thousands of developers choose Zymbit secure modular products to protect sensitive IP, data and credentials from digital and physical attacks when deployed in the wild.
Thousands of developers choose Zymbit secure modular products to protect valuable assets from digital and physical attacks when deployed in the wild.
Thousands of developers choose Zymbit secure modular products to protect their valuable assets from digital and physical exploits when deployed in the wild.
Thousands of developers choose Zymbit security products to protect unattended IoT devices and edge assets from digital and physical exploits.
https://www.zymbit.com/wp-content/uploads/2022/01/Bison-Exploded-View-Isometric-e1641355398193.png
https://www.zymbit.com/wp-content/uploads/2022/01/Bison-Exploded-View-Isometric-e1641355398193.png

Secure Compute Solutions

that protects your valuable assets from real world exploits

Built to protect your software, data and credentials

Thousands of developers choose Zymbit secure modular products to protect sensitive IP, data and credentials from digital and physical exploits.
Thousands of developers choose Zymbit security products to protect unattended IoT devices and edge assets from digital and physical exploits.

Easy to integrate modular products & services

Secure > Modular > Scalable

Zymbit modular products offer increasing levels of device security, key management and compute power.

Zymbit products offer increasing levels of device security, key management and compute power.

ZYMBIT ZYMKEY4 plugin security module for raspberry pi

SECURE KEYS

Protect device, data, software & credentials

ZYMBIT HSM6 embedded hardware wallet

SECURE WALLET

Generate, manage & recover hundreds of keys

ZYMBIT secure compute module

SECURE COMPUTE MODULE

Deploy faster, reduce long term risk

Designed for developers

Easy to integrate

Robust APIs that simplify security

We recognize that security is often the last thing you get to think about. That’s why we provide high level abstractions that deliver essential protection without the need for expert security knowledge.
protect edge device with zymbit
API in C, C++, Python
App Utils library simplifies integration of cryptographic & device security features.
Learn how to encrypt file systems, use tamper detect, configure digital wallets with detailed examples.
REFERENCE DOCS
Product briefs, conformity docs, mechanical drawings, CAD files and more.
COMMUNITY FORUM
Ask questions and get answers on popular topics relating to zymbit products and applications.

Trusted by professionals around the world

” This is awesome! I see a lot of use cases where we can apply these devices to our IoT initiatives. “

Chad N.  US

“Zymkey 4i was ultimately selected as it had much better support for setup, encryption and LUKS.”

Vinay Kumar Calastry Ramesh. USA

” zymbit makes it harder to copy software “

rpiMike  UK

” Many positive feedbacks regarding cryptographic hardware from Zymbit.”

Alberto T.  Spain

” I use a raspberry pi in an industrial case with a zymbit 4i security module which is very good for keeping the contents of the SD card private. “

tttdevelop.  Canada

” Very impressed with this little device! Setup was very easy. It worked out of the box.”

Peter G. US

” If you’re a security professional like me that needs hardware secret key support and rock solid encryption Zymkey is a great device.”

Pythonguy. US

” ZYMKEY passed our tests perfectly, of course. “

Aaron J. UK

” You guys are so great to work with! Zymbit provides the extra layer to keep your keys on the ZYMKEY, locked and married to the device.”

Travis L. US

” While looking for a way to make the Raspberry safer, I found ZYMKEY4 and it turned out to be great.”

Ivan K. Germany

” Zymkeys are instrumental in turning a would-be major data loss into ‘just’ a hardware loss”

D. US

Trusted by Amazon

Learn from AWS global tech lead Tim Mattison about best practices for key storage and more…
AWS qualified device

Tough to infiltrate

Layers of digital & physical security with unified API

In the real world, your unattended assets are vulnerable to digital and physical exploits. Equipment that is accessed locally through wired, wireless and physical channels, can become a pathway to exposing sensitive data, credentials and IP.

Zymbit’s secure technology stack provides multiple layers of digital and physical protection that operate independent of the host equipment.
protect edge device with zymbit
MEASURED SYSTEM IDENTITY
Multiple system factors form a robust device-specific identity that can be used for self-attestation.
PHYSICAL TAMPER SENSORS
Two perimeter circuits, accelerometer
and temperature sensors provide
layers of physical security.
DATA ENCRYPTION & SIGNING
Strong cipher suite includes ECDSA, ECDH, AES-256, SHA256. ECC KOBLITZ P-256. Integrates with TLS certificates.
KEY STORAGE & GENERATION
Public/private key pairs are generated in a tamper resistant secure element. User defined tamper policies and actions.
HARDWARE WALLET
BIP32/39/44 & SLIP39 compliant digital wallet functions that simplify integration with blockchain and digital currencies.
CRYPTOGRAPHIC ENGINE
ED25519, X25519, ECC KOBLITZ P-256, ECC NIST P-256, ECDH (FIPS SP800-56A), ECDSA (FIPS186-3), AES-256 (FIPS 197), TRNG (NIST SP800-22) ….
BATTERY MONITOR, LAST GASP
User defined protection policies, including key destruction with in-module energy source.
VERIFIED BOOT
Verify signatures and integrity of boot and system files against user defined manifest.
ENCAPSULATION & ENCLOSURES
Protect against physical and electrical access threats with tough materials and secure design.
ULTRA LOW POWER
A single coin cell battery can provide years of protection after main power is removed or compromised.
REAL TIME CLOCK
An autonomous sense of time helps resist against power and NTP attacks.
FILE SYSTEM ENCRYPTION
Seamless integration with Linux Unified Key Setup framework and dm-crypt.

Tough to infiltrate

Layers of physical, digital and cryptographic security with unified API

In the real world, unattended assets are vulnerable to digital and physical exploits. Equipment that is accessed locally through wired, wireless and physical channels, can become a pathway to exposing sensitive data, credentials and IP.

Zymbit’s secure technology stack provides multiple layers of digital and physical protection that operate independent of the host equipment.
protect edge device with zymbit
MEASURED SYSTEM IDENTITY
Multiple system factors form a robust device-specific identity that can be used for self-attestation.
PHYSICAL TAMPER SENSORS
Two perimeter circuits, accelerometer
and temperature sensors provide
layers of physical security.
DATA ENCRYPTION & SIGNING
Strong cipher suite includes ECDSA, ECDH, AES-256, SHA256. ECC KOBLITZ P-256. Integrates with TLS certificates.
KEY STORAGE & GENERATION
Public/private key pairs are generated in a tamper resistant secure element. User defined tamper policies and actions.
HARDWARE WALLET
BIP32/39/44 & SLIP39 compliant digital wallet functions that simplify integration with blockchain and digital currencies.
CRYPTOGRAPHIC SERVICES
ED25519, X25519, ECC KOBLITZ P-256, ECC NIST P-256, ECDH (FIPS SP800-56A), ECDSA (FIPS186-3), AES-256 (FIPS 197), TRNG (NIST SP800-22) ….
BATTERY MONITOR, LAST GASP
User defined protection policies, including key destruction with in-module energy source.
VERIFIED BOOT
Verify signatures and integrity of boot and system files against user defined manifest.
ENCAPSULATION & ENCLOSURES
Protect against physical and electrical access threats with tough materials and secure design.
ULTRA LOW POWER
A single coin cell battery can provide years of protection after main power is removed or compromised.
REAL TIME CLOCK
An autonomous sense of time helps resist against power and NTP attacks.
FILE SYSTEM ENCRYPTION
Seamless integration with Linux Unified Key Setup framework and dm-crypt.

Solution focused

Protect and verify edge assets and transactions

Securing sensitive assets and transactions

All share the common goal of securing IP, data and credentials when deployed in vulnerable edge devices.
IOT & EDGE COMPUTE
PROGRAMMABLE HARDWARE WALLET
REMOTE DATA ORACLES
DECENTRALIZED TRANSACTIONS
RENEWABLE ENERGY CERTIFICATES
VEHICLE TO EVERYTHING

Designed and manufactured in California

Zymbit products are designed, manufactured and programmed in California in an ISO9001 facility.
https://www.zymbit.com/wp-content/uploads/2016/05/Zymkey-II-USB-Manufacture-2.png
https://www.zymbit.com/wp-content/uploads/2016/05/Zymkey-II-USB-Manufacture-3-1.png
https://www.zymbit.com/wp-content/uploads/2021/02/R0001896_crop_medres-e1614103488975.jpg
Contact Zymbit > to learn more about our manufacturing and supply chain management. 

Ready to get started?

Explore and choose the best Zymbit product for your application. If you have questions or need something custom then were ready to help.
I’M READY TO BUY
Zymbit products are available from major distributors around the world, or directly from our webstore.
I HAVE QUESTIONS
If you need help with your application, or want to discuss a custom solution then contact us today.
https://www.zymbit.com/wp-content/uploads/2017/11/Zymbit-Logo-noBG-small.png

120 Cremona Drive, Goleta, 

California, 93117, USA

+1 (805) 481 4570

GET UPDATES

Subscribe to email updates.