Impulse Offer

Ensuring the security of connected objects and the protection of the data they exchange is becoming a vital issue for many companies. The loss of control over an object or the leaking of private data can quickly lead to dramatic consequences on the credibility of a product or service offering. In this context, manufacturers have an important role to play.

Whether they are designers of software or hardware solutions, manufacturers of connected objects, or suppliers of electronic components, IoT stakeholders must work together to propose solutions adapted to security and data protection needs.


Explanation by our cyber security experts at LACROIX: Frédéric Piller (Digital Factory R&D Manager) and Yannick Gaudin (R&D Security Architect).


Frédéric Piller
Digital Factory R&D Manager, LACROIX


Yannick Gaudin
R&D Security Architect, LACROIX

Why is the need for security higher for connected objects?

Two key elements link security and connected objects.

Connected objects are increasingly present in our daily lives. Whether for domestic or professional use, it is estimated that by 2025, 75 billion objects will be connected to the internet. Smart light bulbs, predictive maintenance sensors on production lines, personal data collection systems and the likes are among the smart devices that make use of different network technologies (e.g. 4G, Wi-Fi, LoRa) to process, send, and analyze data.

In parallel to this growth in the production of connected objects, there is also a growing number of cyber attacks on these objects. Data theft, taking control of devices, and interruption of services are just a few of many examples.

As a designer of IoT solutions, what solutions do you implement to ensure security for the data of your customers’ connected objects?

Our role is to support our customers in the design of their IoT products by directly integrating cyber security, by:

  • Uniquely and safely identifying products
  • Authenticating communications with our IoT platforms to ensure the origin of data received and transmitted
  • Protecting the integrity and authenticity of our product code to prevent it from being used for malicious purposes
  • Continuously updating security protocols to correct flaws, add new features, or renew certificates, for example
  • Granting the ability to store confidential data (passwords, private keys)


This level of security must be maintained throughout the lifespan of an IoT product, from its design to its recycling, including its production and operation.

How do you support your customers with the “Secure by Design” approach?

Our product design strategy is based on the “Secure by Design” concept. It is essential to secure the design of your products as far upstream as possible.

Right from the start, we support our customers with risk analysis to fully understand the level of security to be implemented depending on the environment in which the product will operate. We then define the hardware architecture solution (electronic, mechanical) and software adapted to our customers’ needs. We organize all our practices and processes around cyber security: code reviews, coding rules, crisis management plans, active monitoring of vulnerabilities, etc. These processes allow us to anticipate potential security threats. We address cyber security at the entire system level so as not to leave any weak links that could compromise the whole security chain.

With the production sites of the Electronics activity of LACROIX, we are fully able to support you with the manufacture of your IoT projects. We make it possible to connect with your PKI (Public Key Infrastructure), or that of LACROIX if you do not have one, in order to ensure solid authentication of products, right from the onset of factory production.

We also offer a generic and secure IoT platform that connects all IoT products produced by LACROIX. This platform has numerous advantages, particularly with regards to data collection and processing, secure firmware updates, certificate renewal, and industrial fleet management (device management).

The development of this IoT platform is at the heart of our “Secure by Design” strategy. Our versatile LX Connect platform offers you a turnkey solution to accelerate your IoT projects.

Discover in video an overview of our IoT platform


Contact us to speak about your IoT project


To find out more about how to secure and protect connected objects, check out this conference, recorded during SIDO 2022 in Lyon, France: “Faced with the challenges of security and data protection for connected objects, we provide an overview of the most recent solutions best suited to a given application”.


With the participation of 4 speakers:

  • Eric Faure: Global Field Engineering Team Manager at ProvenRun
  • Frédéric Piller: Digital Factory R&D Manager at LACROIX
  • Bruno Mussard: Security Marketing Manager at STMicroelectronics
  • Laurent Denis: Marketing Manager of the Microcontroller-Memory & Secure MCU Group at STMicroelectronics