Q: Does PFP only use EMI data?
A: PFP can use DC power or EMI information.
Q: How does PFP sense the EMI data?
A: PFP senses the EMI coming off of a chip, board or device through a probe connected to the pMon device.
Q: Do I have to buy and use one of the PFP pMon devices?
A: PFP has interfaces to commonly used digitization systems. Red Pitaya, National Instruments, HP, Tektronix, and other interfaces are supported.
Q: What does “from cradle-to-grave” mean?
A: PFP technology can be applied to detect intrusions at any point in the products lifecycle. In its infancy during manufacturing, through distribution, and even after installation, PFP can detect insider tampering.
Q: What is detect and remediate before damage?
A: Detection with PFP technology is instantaneous, i.e., literally in milliseconds. With a predefined policy, PFP can detect and stop an attack before injury or data loss can occur.
Q: How could PFP be applied to mobile devices such as a mobile Phone or Fitbit?
A: We can sample once a day or week when the device is put in the charger.
Q: Relationship with other security such as secure boot?
A: Although TPM and secure boot technologies are good, they are not foolproof. To data hacker seem to be able to penetrate even the best cyber security. PFP is a last line of defense, detecting the very execution change as the attack first starts.
Q: How do you remediate?
A: Remediation is a policy based function. The user sets the policy of what is to happen if a change is detected. For example, reboot, shutdown, re-flash, block all traffic, send alert, reroute traffic, switch control to a clone, etc.