Mitigate IoT security risks with the


Discover zero-day vulnerabilities in automotive ECUs, connected medical devices and IoT before

the bad guys!

Download the

Centrifuge white paper

See it in action...

Companies rely on Centrifuge to quickly identify vulnerabilities introduced by insecure coding practices, linking to flawed open source libraries or vulnerabilities introduced by the compilation process itself.

It's the roadmap to vulnerability discovery just before production and the final step in the embedded firmware development life cycle.

Does your company use and link to open source libraries in your firmware images? Do you know if the libraries themselves are secure?

How do companies and organizations use Centrifuge?

Many companies utilize vendor-provided firmware images in their products, but they don't know they're free from vulnerabilities that could - once integrated into their final product - put them at risk for attack and embarrassment.

Centrifuge evaluates only compiled firmware images with root filesystems. It does not need nor require access to source code!

Supplier Validation

Centrifuge can save significant time and money for governments, intelligence agencies, militaries and their contractors.

Instead of starting from ground-zero looking for vulnerabilities in a target's firmware, Centrifuge can point to the exact binaries, and the function calls within those binaries that could be exploitable.

Time is money in government circles, and Centrifuge is a time/money game changer.

Rapid Exploit Development

Download the white paper

Medical Devices

Discover potential security vulnerabilities in...

Set-top Boxes

Smart Home


Automotive ECUs

...and more!

Download the white paper here >>

© 2017 Tactical Network Solutions.