Secure compute hardware

for IoT & blockchain applications

for critical applications

for insecure environments

Thousands of developers – in startups and Fortune 500s – use Zymbit products to protect sensitive IP, data and credentials and deploy their innovations faster.
Thousands of developers choose Zymbit hardware products to protect sensitive IP, data and credentials from digital and physical exploits.
https://www.zymbit.com/wp-content/uploads/2022/01/Bison-Exploded-View-Isometric-e1641355398193.png
https://www.zymbit.com/wp-content/uploads/2022/01/Bison-Exploded-View-Isometric-e1641355398193.png

Secure compute hardware

for IoT & blockchain applications

for critical applications

for insecure environments

Thousands of developers – in startups and Fortune 500s – use Zymbit products to protect sensitive IP, data and credentials and deploy their innovations faster.
Thousands of developers choose Zymbit hardware products to protect sensitive IP, data and credentials from digital and physical exploits.

Innovate faster

Secure modular solutions

Secure, modular & easy to scale

Zymbit modular hardware and APIs are easy to scale without compromising security

Zymbit hardware and APIs help you innovate faster without compromising security.

zymbit ZYMKEY hardware security module fitted to raspberry pi computer

Hardware Security Modules

For Raspberry Pi and Nvidia Jetson

  • SD card encryption with LUKS integration
  • Measured system identity & authentication
  • Secure key generation & storage
  • Data encryption & signing
  • Physical tamper sensors
  • Real time clock
HSM6 - embedded hardware wallet

Embedded Hardware Wallets

For blockchain applications

  • HD wallet, BIP 32/39/44 compliant
  • 640 key slots, public/private, foreign
  • ED25519, X25519, secp256k1, secp256r1
  • Shamir’s wallet recovery, SLIP39 compliant
  • Ideal for decentralized blockchain, crypto
  • Fully encapsulated tamper resistant
zymbit-secure-compute-platform

Secure Compute Nodes

Secure, modular and ready to scale

  • Fully integrated compute & security hardware
  • Verified boot with user defined manifest
  • Open modular design for easy customization
  • Programmable hardware wallet
  • Tamper resistant professional enclosure
  • Pre-provisioned for AWS, Azure

Designed for developers

Robust APIs that simplify security

We recognize that security is often the last thing developers get to think about. That’s why we provide high level abstractions that deliver essential protection without the need for expert security knowledge.
protect edge device with zymbit
API in C, C++, Python
App Utils library simplifies integration of cryptographic & device security features.
Learn how to encrypt file systems, use tamper detect, configure digital wallets with detailed examples.
REFERENCE DOCS
Product briefs, conformity docs, mechanical drawings, CAD files and more.
COMMUNITY FORUM
Ask questions and get answers on popular topics relating to zymbit products and applications.

Trusted by professionals around the world

” This is awesome! I see a lot of use cases where we can apply these devices to our IoT initiatives. “

Chad N.  US

“Zymkey 4i was ultimately selected as it had much better support for setup, encryption and LUKS.”

Vinay Kumar Calastry Ramesh. USA

” Many positive feedbacks regarding cryptographic hardware from Zymbit.”

Alberto T.  Spain

” I use a raspberry pi in an industrial case with a zymbit 4i security module which is very good for keeping the contents of the SD card private. “

tttdevelop.  Canada

” Very impressed with this little device! Setup was very easy. It worked out of the box.”

Peter G. US

” If you’re a security professional like me that needs hardware secret key support and rock solid encryption Zymkey is a great device.”

Pythonguy. US

” ZYMKEY passed our tests perfectly, of course. “

Aaron J. UK

” You guys are so great to work with! Zymbit provides the extra layer to keep your keys on the ZYMKEY, locked and married to the device.”

Travis L. US

” While looking for a way to make the Raspberry safer, I found ZYMKEY4 and it turned out to be great.”

Ivan K. Germany

” Zymkeys are instrumental in turning a would-be major data loss into ‘just’ a hardware loss”

D. US

Tough to infiltrate

Layers of digital & physical security with unified API

In the real world, unattended assets are vulnerable to digital and physical exploits. Equipment that is accessed locally through wired, wireless and physical channels, can become a pathway to exposing sensitive data, credentials and IP.

Zymbit’s secure technology stack provides multiple layers of digital and physical protection that operate independent of the host equipment.
protect edge device with zymbit
MEASURED SYSTEM IDENTITY
Multiple system factors form a robust device-specific identity that can be used for self-attestation.
PHYSICAL TAMPER SENSORS
Two perimeter circuits, accelerometer
and temperature sensors provide
layers of physical security.
DATA ENCRYPTION & SIGNING
Strong cipher suite includes ECDSA, ECDH, AES-256, SHA256. ECC KOBLITZ P-256. Integrates with TLS certificates.
KEY STORAGE & GENERATION
Public/private key pairs are generated in a tamper resistant secure element. User defined tamper policies and actions.
HARDWARE WALLET
BIP32/39/44 & SLIP39 compliant digital wallet functions that simplify integration with blockchain and digital currencies.
CRYPTOGRAPHIC ENGINE
ED25519, X25519, ECC KOBLITZ P-256, ECC NIST P-256, ECDH (FIPS SP800-56A), ECDSA (FIPS186-3), AES-256 (FIPS 197), TRNG (NIST SP800-22) ….
BATTERY MONITOR, LAST GASP
User defined protection policies, including key destruction with in-module energy source.
VERIFIED BOOT
Verify signatures and integrity of boot and system files against user defined manifest.
ENCAPSULATION & ENCLOSURES
Protect against physical and electrical access threats with tough materials and secure design.
ULTRA LOW POWER
A single coin cell battery can provide years of protection after main power is removed or compromised.
REAL TIME CLOCK
An autonomous sense of time helps resist against power and NTP attacks.
FILE SYSTEM ENCRYPTION
Seamless integration with Linux Unified Key Setup framework and dm-crypt.

Tough to infiltrate

Layers of digital & physical security with unified API

In the real world, unattended assets are vulnerable to digital and physical exploits. Equipment that is accessed locally through wired, wireless and physical channels, can become a pathway to exposing sensitive data, credentials and IP.

Zymbit’s secure technology stack provides multiple layers of digital and physical protection that operate independent of the host equipment.
protect edge device with zymbit
MEASURED SYSTEM IDENTITY
Multiple system factors form a robust device-specific identity that can be used for self-attestation.
PHYSICAL TAMPER SENSORS
Two perimeter circuits, accelerometer
and temperature sensors provide
layers of physical security.
DATA ENCRYPTION & SIGNING
Strong cipher suite includes ECDSA, ECDH, AES-256, SHA256. ECC KOBLITZ P-256. Integrates with TLS certificates.
KEY STORAGE & GENERATION
Public/private key pairs are generated in a tamper resistant secure element. User defined tamper policies and actions.
HARDWARE WALLET
BIP32/39/44 & SLIP39 compliant digital wallet functions that simplify integration with blockchain and digital currencies.
CRYPTOGRAPHIC SERVICES
ED25519, X25519, ECC KOBLITZ P-256, ECC NIST P-256, ECDH (FIPS SP800-56A), ECDSA (FIPS186-3), AES-256 (FIPS 197), TRNG (NIST SP800-22) ….
BATTERY MONITOR, LAST GASP
User defined protection policies, including key destruction with in-module energy source.
VERIFIED BOOT
Verify signatures and integrity of boot and system files against user defined manifest.
ENCAPSULATION & ENCLOSURES
Protect against physical and electrical access threats with tough materials and secure design.
ULTRA LOW POWER
A single coin cell battery can provide years of protection after main power is removed or compromised.
REAL TIME CLOCK
An autonomous sense of time helps resist against power and NTP attacks.
FILE SYSTEM ENCRYPTION
Seamless integration with Linux Unified Key Setup framework and dm-crypt.

Solution focused

Protect and verify edge assets and transactions

Securing sensitive assets and transactions

All share the common goal of securing IP, data and credentials when deployed in vulnerable edge devices.
IOT & EDGE COMPUTE
PROGRAMMABLE HARDWARE WALLET
REMOTE DATA ORACLES
DECENTRALIZED TRANSACTIONS
RENEWABLE ENERGY CERTIFICATES
VEHICLE TO EVERYTHING

Designed and manufactured in California

Zymbit products are designed, manufactured and programmed in California in an ISO9001 facility.
https://www.zymbit.com/wp-content/uploads/2016/05/Zymkey-II-USB-Manufacture-2.png
https://www.zymbit.com/wp-content/uploads/2016/05/Zymkey-II-USB-Manufacture-3-1.png
https://www.zymbit.com/wp-content/uploads/2021/02/R0001896_crop_medres-e1614103488975.jpg
Contact Zymbit > to learn more about our manufacturing and supply chain management. 

Ready to get started?

Explore and choose the best Zymbit product for your application. If you have questions or need something custom then were ready to help.
I’M READY TO BUY
Zymbit products are available from major distributors around the world, or directly from our webstore.
I HAVE QUESTIONS
If you need help with your application, or want to discuss a custom solution then contact us today.
https://www.zymbit.com/wp-content/uploads/2017/11/Zymbit-Logo-noBG-small.png

120 Cremona Drive, Goleta, 

California, 93117, USA

+1 (805) 481 4570

GET UPDATES

Subscribe to email updates.