Security, update & recovery tools, for IoT edge compute.

Making IoT edge compute secure, resilient, maintainable.

Secure, resilient compute solutions for IoT edge

Zymbit products are loved by developers for ease of integration, and trusted by ops teams for secure, reliable fleet operations in zero trust environments.

Trusted by developers who need the freedom to innovate, and by operators who need secure, reliable long term operation.

Zymbit Secure Edge Node with Compute Module

Get started now with solution briefs.

File system encryption
AB updates with recovery
Using physical tamper sensors
Secure boot and beyond

Easy to integrate, software and hardware.

Standard Products. Ready to Integrate.

Bootware® simplifies endpoint security

Integrated tooling for security, image management and recovery
  • Secure boot anchored to security module. 
  • A/B image management.
  • Fallback and recovery options.
  • Encrypted filesystem and user kernel.
  • Signed images and updates.
  • Seamless integration with Raspberry Pi OS and Ubuntu.
  • Available on all Zymbit products. 
Zymbit Bootware unified security and resilience tool for IoT edge.

Plug-in security for Raspberry Pi

Easy to integrate hardware security module
  • File system encryption. 
  • Secure key generation & storage.
  • Data encryption & signing.
  • A/B updates.
  • Seamless integration with Bootware.
  • Multiple tamper sensors.
  • Real time clock
  • Protects Pi5, Pi4, Pi Zero, CM4.
  • Works with SEN 400 & Protokit 400 products.
zymbit hardware security module for raspberry pi computers - HSM not TPM

Secure compute nodes for enterprise

Ready to deploy with lifetime resilience built in.
  • Protected in tamper responsive enclosure. 
  • Professional grade baseboard.
  • Choice of compute – Pi CM4 or Zymbit SCM4.
  • Choice of security – essential or enhanced. 
  • Extensive IO and expansion options.
  • Industrial grade power supply, managed.
  • Seamless integration with Bootware.
zymbit secure raspberry pi compute node for enterprise - PICM4 inside

Secure tiny nodes for IoT fleets

Open modular architecture for OEMs and solution integrators
  • Customer programmable application CPU/MCU.
  • Choice of Linux CPU or embedded MCU.
  • Modular IO and communication options. 
  • Easy transition to low cost, high volume applications.
  • Zymbit hardware security module onboard.
  • Seamless integration with Bootware.
Zymbit plug-in hardware security modules HSM for raspberry pi

Developer tools and pilot kits

Transition easily from prototypes to field deployable, secured solutions.

Professional protokits for Pi compute

Build, test and iterate your next idea on a robust, scalable platform.
  • Professional grade baseboard.
  • Choice of compute – Pi CM4 or Zymbit SCM4.
  • Choice of security – essential or enhanced. 
  • Extensive IO and expansion options.
  • Seamless integration with Bootware.
  • Managed power supply.
  • Easy upgrade to Secure Edge Node 400.
Zymbit plug-in hardware security modules HSM for raspberry pi

Lock down your devices, not your creativity.

Choose from professional components that provide scalable security, seamless updates, and long-term operational resilience

Resilient Core. Modular Hardware. Unified Tools.

Choose the hardware features and level of security you need for your application. Simplify the update, maintenance and recovery of diverse devices and streamline integration with your operating system, network and upstream services.
https://www.zymbit.com/wp-content/uploads/2024/08/SEN-400-Assembly-Stack-15.png

Less fragile, more agile development.

Zymbit products work together seamlessly to handle security and long-term reliability, freeing developers to focus on innovation.

Low friction development.

Resilient Edge Fabric

Best in class technologies that work together seamlessly and are easily integrated with endpoints and upstream services.

Bootware® Services

Metal to OS management layer that makes IoT endpoints and infrastructure resilient to compromised updates and bricked hardware.

  • A/B updates managed in secure silicon.
  • Encrypted filesystem and user kernel.
  • Signed images and updates.
  • Fallback and recovery options.
  • Future support for trustless recovery
  • Seamless integration with RPi OS, Ubuntu.
  • Easy upgrade from standard RPi products.
  • Get free Bootware for developers.

Zymbit API

Simplifies configuration and management of device level security and resilience features and integrations with customers’ software services.

  • Encrypted file system.
  • Hardware root of trust.
  • Secure key generation & storage.
  • Measured system identity & authentication.
  • Data encryption & signing.
  • Multiple tamper sensors.
  • Real time clock.
  • C, C++, Python.

Resilient Core

Zymbit Resilent Cores manage the security, resilience and recovery of unattended endpoint platforms in a consistent and robust way.

  • Autonomous from application CPU.
  • Cryptographic service engine.
  • Key management.
  • Encrypted file system.
  • Boot chain supervision.
  • Power supervision.
  • Hardware recovery.
  • Available in module, chip down, cores.

Trusted by professionals around the world.

Jeff Geerling Reviews

"The Secure Edge Node is certainly the most secure Raspberry Pi!"
Jeff Geerling Reviews Zymbit
https://www.zymbit.com/wp-content/uploads/2023/05/jeff-geerling-video-zymbit-sen-review-splash-youtube-202304-1500-px.png

Trusted by Amazon

Learn from AWS global tech lead Tim Mattison about best practices for key storage and more...
zymbit AWS geengrass qualified

” This is awesome! I see a lot of use cases where we can apply these devices to our IoT initiatives. “

Chad N.  US

“Zymkey 4i was ultimately selected as it had much better support for setup, encryption and LUKS.”

Vinay Kumar Calastry Ramesh. USA

” zymbit makes it harder to copy software “

rpiMike  UK

” Many positive feedbacks regarding cryptographic hardware from Zymbit.”

Alberto T.  Spain

” I use a raspberry pi in an industrial case with a zymbit 4i security module which is very good for keeping the contents of the SD card private. “

tttdevelop.  Canada

” Very impressed with this little device! Setup was very easy. It worked out of the box.”

Peter G. US

” If you’re a security professional like me that needs hardware secret key support and rock solid encryption Zymkey is a great device.”

Pythonguy. US

” ZYMKEY passed our tests perfectly, of course. “

Aaron J. UK

” You guys are so great to work with! Zymbit provides the extra layer to keep your keys on the ZYMKEY, locked and married to the device.”

Travis L. US

” While looking for a way to make the Raspberry safer, I found ZYMKEY4 and it turned out to be great.”

Ivan K. Germany

” Zymkeys are instrumental in turning a would-be major data loss into ‘just’ a hardware loss”

D. US

Designed and manufactured in California.

Enjoy peace of mind with components of verified origin and quality, minimizing risks and ensuring reliable long term operation.
zymbit hardware security modules HSM for raspberry pi
zymbit security modules manufactured in the USA
zymbit secure edge nodes manufactured and provisioned in the USA
Contact Zymbit > to learn more about our manufacturing and supply chain management. 

Ready to get started?

Explore and choose the best Zymbit product for your application. If you have questions or need something custom then were ready to help.
I'M READY TO BUY
Zymbit products are available from major distributors around the world, or directly from our webstore.
I HAVE QUESTIONS
If you need help with your application, or want to discuss a custom solution then contact us today.
https://www.zymbit.com/wp-content/uploads/2017/11/Zymbit-Logo-noBG-small.png

120 Cremona Drive, Goleta, 

California, 93117, USA

+1 (805) 481 4570

GET UPDATES

Subscribe to email updates.