Design and build secure IoT products

Bring secure products rapidly to market by using our expertise, experience and products.

Find out how

About Us

We Consult

Our extensive practical design experience ensures you include appropriate security from the earliest stages.

We Assess

We review the security of your product and perform practical security testing based on the latest methods.

We Develop

We develop the difficult security-related hardware, firmware and software components needed for your product.

What We Do


Protect Your Business

Security failures can damage your reputation and result in legal and financial liability.

We can help you ensure your product is ready for market.

Find out how...

Accelerate Your Time to Market

IoT security is complex, difficult to get right and requires niche skills.

Draw on our skills, experience and products to get your product faster to market.

Find out how...

Build your capabilities

Security doesn't stop once a project completes.

We ensure your company acquires the skills and support they need to keep growing.

Find out how...

Customer Testimonials

Photo of Çağatay Büyüktopçu

Çağatay Büyüktopçu

R&D Embedded Systems Team Leader and Cybersecurity Coordinator, Arçelik Group

One of the biggest and maybe the most difficult challenge of IoT security is resource constrained environments. Almost all household appliances have such kind of microcontrollers. To be IoT compatible, all Arcelik group brands like Beko, Grundig and all others need to be connected in a secure way. IoT security is a must-have feature for us. We worked together with the Cerberus team, who have a great know-how about embedded security. With the help of Cerberus's hands-on design support, we created an embedded security infrastructure for all of our connected appliances and achieved great success like being awarded IoTSF Security Champion in 2018, getting IoTSF Best User mark and finally getting Common Criteria approval at EAL2 level.

Our Team

Photo of Dr Carl Shaw

Dr Carl Shaw


Experienced security analyst and engineer specialising in hardware, firmware and software.

Photo of Paul Elliott

Paul Elliott


Experienced security architect with expertise in hardware silicon security design, review and implementation.

Photo of Andrew Lindsay

Andrew Lindsay


Experienced security architect, analyst and implemention specialist.

Photo of Dr Luke Mather

Dr Luke Mather

Applied Cryptographer

Specialist in communications security and side channel attacks.

Photo of Prof. Elisabeth Oswald

Prof. Elisabeth Oswald

Technical advisor

Specialist advisor in advanced side channel attacks.

Photo of Dr Dan Page

Dr Dan Page

Technical advisor

Specialist advisor in hardware security and securing software toolchains.

Photo of Colin Mallett

Colin Mallett

Technical advisor

A specialist technical advisor with extensive experience in the Smart Energy sector.

Our Markets


We have extensive experience in pragmatic security for products with volume manufacturing, time-to-market and cost constraints.


We understand the cyber-security and privacy regulations from the EU and FDA and can help with device and communications security.


From physical access controllers to remote sensors and actuator controllers, we have the skills and experience to help build secure products.


We help to secure hardware devices and act as an independent security reviewer. We also help vendor customers requiring security advice.


We secure smart energy products from smart meters to smart solar panels used for authenticated green credit blockchain trading.


We secure in-vehicle and external communications and devices and review electronic components from all manufacturing tiers.

Our News


South West Tech 101 list

Cerberus are delighted to be included in BusinessCloud’s South West Tech 101 list of the best tech companies in the South West, selected from nominations, industry consulation and BusinessCloud’s own research.

Read more
View all posts

Our Blog


Raspberry Pi Security for IoT Products

At Cerberus we get a lot of companies who ask us to review the security of their product after they’ve designed it and are making plans to put it on to the market, but one of the things that scares us the most is when they say, “I’ve got an IoT product based on a Rasperry Pi - How do I secure it?

Read more

Hardware Random Number Generators

A good source of random numbers is critical for many cryptographic operations including most current cryptographic communications protocols and in this article we’ll look at how they’re generated in modern system-on-chips, best practice for using them and how they can be attacked.

Read more

What is an IoT Hardware Secure Element?

Hardware secure elements such as Microchip’s ATECC508A and ATECC608A, STMicroelectronics’s STSAFE-A100 or NXP’s A71CH are being promoted as a solution to improve IoT security - but what do these devices do, how do they help and what are their limitations?

Read more
View all posts

Get In Touch

Contact Details

Please contact us using the details below or by using the inline form

Future Space, Filton Road, Bristol BS34 8RB, United Kingdom
Phone: +44 (0)117 214 0940
Thank you. The Mailman is on His Way :)
Sorry, don't know what happened. Try later :(