Cog Systems acquires Aegis Secure to expand its reach into Ultra-Secure Connected Products

Cog Systems acquires Aegis Secure to expand its reach into Ultra-Secure Connected Products

Cog expands as the leading provider of Ultra-Secure Services and Products

 

Cog Systems, Inc. proudly announces the acquisition of Aegis Secure, Inc. to allow Cog the expanded capability beyond the building of ultra-secure connected device solutions, to now commercialize those solutions into products available to the global marketplace.

Connected devices make life easier for millions of people worldwide and unfortunately also make it easier for malicious hackers to get their hands on sensitive data, or worse.   Cog Systems has a long heritage of providing services to help our customers secure existing commercial devices, leveraging type-1 virtualization on ARM. Cog solves very hard problems by developing bespoke solutions that improve security through isolation, encryption, and modularity. Cog builds trusted platforms for discerning end users who are looking to improve the security profile of commercial connected devices (IoT).

Aegis Secure has proven the demand for the availability of these products, by commercializing bespoke software solutions on existing commercial products and then making them available to the government and enterprise markets.   With products such as the Aegis R51 Enhanced Retransmission Device (ERD) and the Aegis A51 Ultra-Secure Mobile device, Aegis has validated the genuine need of the market to acquire and adopt these products for end-users in key markets that are looking to take a proactive approach to ensure the security of their communications.  Additionally, Aegis has a robust funnel of new devices slated for commercialization over the next three to five years.

Cog and Aegis bring together a one-stop shop for our customers that both look to develop ultra-secure solutions and then have them commercialized to make them available for consumption by the market.   “As we looked for ways to further accelerate our growth, it became patently obvious that the addition of Aegis to help Cog take the solutions we develop for our customers and then commercialize them for public consumption was the logical extension of brand in the cybersecurity business.” said Carl L. Nerup, CEO of Cog Systems, “Adding Aegis to the Cog family enables us to become the ’easy button’ for our customers that want to see their investment in the solutions we develop become commercialized and available to the broader market.”

Aegis is well positioned to take advantage of the tremendous market demand for ultra-secure connected devices built on existing commercial devices.   “Linking the development and the commercialization of bespoke ultra-secure connected devices enables the team at Aegis to leverage Cog’s services capability to create variants of existing commercial ultra-secure products to meet the unique use cases of our customers,” said Jason Sebranek, Co-Founder and CTO of Aegis Secure.

Aegis will join the other top-caliber talent at Cog to form a single unified team to ensure the development, commercialization, and support for ultra-secure products that are provided holistically from one unified company.

About Cog Systems

Cog Systems has been preparing for the revolution in connected device architecture since 2014.  By coupling the same modularity techniques used in cloud computing with the fundamentals of security, trustworthiness, and adaptability to enable highly secure connected devices, Cog proactively delivers the assurance of defense-grade security for world governments and corporate enterprises.  Aegis Secure has been building bespoke Ultra-Secure Mobile™ products since 2021 for a discriminating set of customers in the public and private sectors.   https://cog.systems/    https://aegis51.com

 

ABOUT COG SYSTEMS

Cog, the solution for securing IoT, has been preparing for the revolution in connected device architecture since 2014. The traditional architecture of IoT and smart devices creates a massive attack surface, forcing security policy to accept high risk, restricted access, which poses a burden on users. By coupling the same modularity techniques used in cloud computing with the fundamentals of security, trustworthiness, robustness, and adaptability to enable highly secure connected devices, Cog proactively delivers the assurance of defense-grade security for world governments, defense organizations, and corporate enterprises. In addition, the company now offers the first secure smartphone with the most certifications on the U.S. Commercial Solutions for Classified (CSfC) list.