Using Out-of-Band Monitoring & Machine Learning

Detect differences, counterfeit, tampering & malware in microelectronics

From Supply Chain Risk to Advanced Persistent Threats


Detect differences, counterfeit, or tampering in discrete integrated

IoT and IIoT

Proven to detect tampering throughout the supply chain and live attacks during operation, examples include IP surveillance cameras, PLC, and more. PFP could be air-gapped, in power supply or embedded.

IT Equipment & Servers

PFP can be used for incoming inspection, spot checking, and continuous monitoring of server motherboards, SSD, power supply and add ons, including BMC, BIOS/UEFI, USB, NIC, and more

Legacy Equipment

PFP can create a snapshot from approved or known-good configurations, to screen other devices. Without gold samples, cluster analysis can be used to find outliers within many devices.


PFP can protect telecommunication such as baseband of radio, Software Defined Radio in RAN, also servers and network infrastructure.

Circuit Board Assembly

PFP can detect boards with counterfeit chips, firmware changes, and more.

Our Products

Siglytics Analytics: On-Premise, Cloud, PC, Embedded

Authentication kit: Portable, disconnected

Embedded SDK

IoT monitors: Standalone, modules


supply chain


Servers and IT equipment

Industrial Control

Contact Us to request a demo!