Pentiq
Applications & Devices

Secure Hardware & IoT Assessment

Connected devices come with a stack: hardware, firmware, radios, cloud back-ends, and the apps that bind them together. Pentiq tests all five - from JTAG and UART tear-down through firmware analysis to BLE, Zigbee, LoRaWAN, and the SaaS estate behind them.

What we test

Test the devices, not just the apps that talk to them.

Hardware interfaces and physical attack surface, extracted firmware (statically and dynamically), wireless protocols, default-credential and secure-boot integrity, and the cloud and mobile-app integrations that complete the system.

Why it matters

The pressure this service answers.

If you build, sell, or rely on connected devices, the security posture of one shipped product can become a recall problem at scale. Catching it pre-deployment is orders of magnitude cheaper than catching it post-disclosure.

Findings from this engagement commonly support evidence for NIS2 (essential and important entities) and ISO 27001 Annex A.

Testing activities

Manual, reproducible, peer-reviewed.

Every engagement is scoped through a formal Rules of Engagement, delivered by an in-house Pentiq consultant, peer-reviewed by a senior tester, and risk-rated using CVSS 4.0 where applicable.

  • Hardware tear-down and JTAG/UART interface analysis
  • Firmware extraction, static/dynamic analysis, and cryptographic review
  • Radio and protocol assessment (BLE, Zigbee, LoRaWAN, Modbus)
  • Default-credential and secure-boot evaluation
  • Cloud and mobile-app integration testing
  • Mitigation roadmap covering secure-development lifecycle enhancements

Methodologies & frameworks

The standards behind every report.

Every report aligns to the methodologies and frameworks your assessors, customers, and insurers already recognise, so findings are defensible, reproducible, and easy to validate.

  • CREST IoT Security Testing Programme
  • OWASP ISVS and OWASP MASVS (mobile apps)
  • ETSI EN 303 645 and NISTIR 8259
  • MITRE ATT&CK for Mobile and Embedded

Outcomes

What you walk away with.

  • Protects devices against tampering, data theft, and service disruption
  • Supports market trust, safety standards, and regulatory compliance
  • Strengthens the secure-development lifecycle through actionable findings
  • Reduces recall and patching costs by catching issues pre-deployment

Get started

Talk to Pentiq about hardware & iot.

Most enquiries get a same working day response from a Pentiq consultant. We'll scope honestly and tell you when an alternative service is the right answer.