Proofs of Security

We are trusted by great customers and companies all over the globe


"TROOPERS is the top-6 world IT security conference. During the conference (12.03.2020 - 16.03.2020), Hacken held multiple challenges for white hat hackers.

At our hardware security village, we deep penetrating the testing of samples Hideez provided us. Our lab was well equipped with: 1) Oscilloscope used to study analog/digital signals; 2) Multimeter (for basic study of circuit design and circuit studies); 3) Soldering Station

There were best-embedded security and application security experts from Europe and other countries among our audience. Those experts had an interest in the challenge, tried to breake mechanisms of software protection, bypass security of keys, and most of them estimated samples as well secure."

Andrew Matiukhin, CTO at Hacken


"Cyberlands B.V. API Penetration Testing company conducted security assessment of Hideez Enterprisein March 2021 (Windows environment).

Particularly we checked whether Hideez Enterprise Solution:

• allows to use Hideez Key without the user being present in front of PC with Bluetooth adapter - not allowed;

• allows to extract secrets from Hideez Key using low-level operations system calls -not allowed;

• allows to steal user credentials by a regular keylogger cybercrime tool - not allowed;

• allows to steal user credentials by targeted sealer cybercrime tool - not allowed;

• protects itself from a reverse engineering attack - not allowed.

Overall Hideez paid notable attention to the security of key storage and is well-defended from regular cybercrime tooling. We suggested improving self-protection mechanisms (anti-unpacking, obfuscation, and several others) and met Hideez’s attention and full understanding of how important cybersecurity is for the product. We can recommend Hideez Enterprise Solution for companies with strong authentication requirements."

Alex Bodryk, Managing director at Cyberlands B.V.

Schedule a Free Consultation
with Our Team

Discover the benefits of  effortless security without passwords

Ресурс 303-1


A demo call is the fastest way to find out what you need. We present a detailed overview of our services and use cases, and leave no questions unanswered.

Ресурс 283-1-1

Running propositions

We look for the most attractive offers and try to get the most out of your initial request.

Ресурс 293-1

Personal Approach

Our experts help you find the most suitable solution to your problem. The call is tailored to your needs.