Security in Integrated Circuit 
Contact us

Bring your connected or mobile solution to the next security level

We believe that security must be implemented in depth and multi layers. For each layer, the threat is specific. We developed software and services to validate the efficiency of the protections. It is important that the protections in place are checked at the right level.

We are proud to announce our arrival in DACH!

Our motto “Think globally, act locally” is bearing fruit: we are opening one more office in the European area - this time in Bonn, the capital of cybersecurity in Germany.

The German team is available to present our solutions and services in the security of ICs and softwares, including mobile apps, IoT devices and backend systems. With this new office, eShard is physically present in 4 countries, and provides services worldwide.

Learn more

Integrated Circuits are at the heart of secure systems

Cryptographic algorithms and sensitive operations must withstand physical attacks. We offers turnkey solutions to perform side-channel, fault injection, failure or binary analyses.

Learn more

Mobile applications are entry points to secure systems

Good practice is to embrace a multi layers strategy to protect a system. It is therefore necessary to harden the mobile application. How to trust that your application reacts well to an intrusion? Our SaaS solution esChecker performs automated testing to validate your app behavior facing an intrusion. A common belief is to think that only applications handling banking or medical data are to be protected, but in fact any application handling personal data has to be secured. As solution providers, you are responsible to do your best to secure personal and sensitive data. This starts by having a qualification process to validate the protections.

Learn more

They Are Safe

Michele Tucci
Chief Product Officer | CredoLab
In late 2018 and 2019, the Financial Services Authority of Indonesia OJK introduced a set of rules aimed at increasing the protection of consumers and their data. As part of the process to comply with the new regulation, CredoLab needed to provide OJK with an independent audit of our mobile SDK. Thanks also to eShard's expert support, in-depth analysis of the source code, and the clear audit report, we were able to gain OJK's confidence. As a result, CredoLab was approved as the only Digital Financial Innovation provider in the Credit Scoring Cluster allowed to use mobile device data for credit scoring purposes. Thanks eShard!
Chiang Kai ER
CTO | V-Key
Before engaging eShard's esCoaching services, we were impressed by the state-of-the-art technologies and techniques that their esSecurityServices consultants used when conducting penetration testing on our products. We wanted our product engineers to learn from them so that we can apply the knowledge to further strengthen our products. We appreciated that the trainers shared not just theoretical knowledge, but also personal experiences in overcoming difficulties. The mindset and thought process as they approached challenging security problems, were very valuable.
Lutz Weimann
Head of mobile security | SRC
At SRC, we highly value eShard's esCoaching because the training modules are tailored specifically to the skill sets of the participants. The modules are built to guide the participants to develop their own solutions to the challenges rather than predefining a path to the solution. Every topic is taught by one of eShard's experts in the respective field, who is also available to support during the practical training sessions. This allows an individual learning experience and enables the participants to apply newly developed skills to real world projects with ease.
© eShard 2021. All rights reserved
Privacy policy | Legal Notice
Bâtiment GIENAH
11 avenue de Canteranne
33600 PESSAC
7 rue Gaston de Flotte
#04-01 Paya Lebar Quarter
1 Paya Lebar Link
eShard GmbH
Lebacher Str. 4
66113 Saarbrücken