Illuminate the Black Box
Sternum raises the bar for dive observability, equipping you with ready access to live insights, historical data,predictive analytics, and tools for contextual root cause analysis.
for IoT Builders
Data collection is enabled by an Observability SDK, coded in C and optimized explicitly for embedded systems. Using proprietary technology, our SDK has a minimal footprint and provides 3X transfer efficiency over alternatives.
The SDK acts as an abstraction layer, between the device and our Cloud platform, which allows it to collect every kind of data from any IoT device – regardless of its type, OS flavor or communication stack (BT, BLE, MQTT, WiFi, etc.) Supporting every connection scenario, the SDK can even be used as a proxy to store data from isolated IoT systems.
for IoT Builders
Information is sent to our Cloud platform, specifically built to manage data from IoT devices; software signals (e.g., status and error codes), and analogical diagnostics from the hardware and the physical environment (e.g., temperature, voltage, and pressure readings).
Enriched with alerts and insights from the anomaly detection engine, the information is presented in a visual UI, offering ready access to real-time and historical data, with numerous slice-and-dice and drill-down options.
Flexible Data Collection
Our SDK helps collects the exact data you need – as granular as you require. By quickly deploying traces into your code, you can customize your monitoring strategy to continuously keep track of user activity, CPU/memory utilization, network stats, battery levels, RSSI, temperature, pressure, and more.
Reduce BT Issues by Over 50%
A device manufacturer experienced repeat BT disconnections that caused user dissatisfaction and led to massive engineering time loss.
After monitoring and analyzing granular BT data with Sternum, the team implemented relevant firmware improvements and the number of issues went down by 50%.
Early Issue Discovery
Information from traces provides contexts for failed test and development issues, helping you easily relate errors to their source – down to specific line of code, process ID, or memory location.
Combined with the integrity verification capabilities of our EIV™ software technology(ies), this also enables auto-discovery of code and memory bugs missed by other tools (e.g., invalid commands and memory leaks) – enabling you to address critical issues early in the development lifecycle when they are least costly to fix.
Detect 0-day Vulnerabilities in Preproduction
A Fortune 500 engaged Sternum for POC, during which Sternum’s runtime protection was integrated into the development process.
Almost immediately, by profiling their firmware in runtime, the team was able to discover four security bugs, including potential memory information leaks and corruption vulnerabilities.
By addressing these bugs pre-market, the company was to resolve issues with relative ease, avoid patching in the field, and prevent future risks to device users.
Adaptive Anomaly Detection
Going beyond general-purpose solutions, our anomaly detection is tailored for a granular understanding of IoT devices through multivariate analysis of software and hardware metrics.
Requiring zero effort to deploy, AI automatically learns the routines of each device in your fleet as soon as it’s connected to our platform.
Using telemetry from your own custom traces, it provides constant situational awareness of device-level issues, tracing temperature increases to excessive usage, failure rates to damage during shipping, stalled updates to connectivity issues, and more.
Saving Millions on Battery Maintenance
A customer was experiencing issues with unexpected battery depletions, leading to substantial financial losses.
The team used Sternum to utilize additional custom traces, and use them to track nuanced metrics which could help predict battery failures.
As a result, the company was able to optimize its investment in battery replacements, maximizing battery life and saving millions of dollars in maintenance costs.
Contextual Root Cause Analysis
For every alert, Sternum provides a detailed chronology and visual information for additional context. These help you understand the buildup of events that led to alert and quickly trace it to its root cause, thereby speeding up remediation, preventing repeat issues, and improving overall system resiliency.
Fix in 15 minutes
Using our investigation tools, a device manufacturer was able to pinpoint a memory corruption issue that was causing disruptions in the field.
Thanks to the detailed alert, the necessary fix was implemented within a mere 15 minutes.
Before Sternum, similar investigations would typically take a staggering 5 months to resolve.
Customizable Views and Alerts
Stermum equips you with a wide range of visualization options to help you manage log, metric, and trace data in a way that best fits your needs – personalizing your dashboards to focus on things that matter most.
Our system also offers granular alert customization to help with noise reduction, enabling you to set alert conditions based on string matches, event counts, occurrences over time, and more.
Uncovering Competitive Insights
A device manufacturer suspected that a competitor was making a move on one of their clients.
Using Sternum’s Topology and Relationship views, the customer discovered that the devices were indeed used in conjunction with competing systems.
The company used the information to refocus its customer success efforts, providing valuable intelligence to the customer-facing teams.
Scalable Fleet Management
Our platform offers a bird’s-eye view of device profiles, alerts, trends, errors, and more across your entire device inventory.
Keeping track of such information as device IDs, firmware versions, deploy status, ‘last seen’ time stamps, locations, connectivity, and more, the platform simplifies large-scale deployments, operations, and incident management.
Pinpointing 94% of Errors to Just Two Bugs
An engineering team responsible for a commercially successful product was swamped with support tickets, impacting their ability to focus on development tasks.
Using Sternum’s fleet monitoring and error analysis capabilities, the company created a fleet-wide dashboard that showed that 94% of the critical errors in the field were caused by only two bugs!
Prioritizing and fixing these bugs freed up time for the team to refocus on product improvements.
“Sternum’s solution saves us time, manpower, and money. Being able to lean on Sternum as an active mitigation is a game changer and the data insights help us build better products and make better decisions.”
Former Product Security Director at Medtronic
“Sternum enhances Zephyr’s built-in security features by providing embedded developers and device manufacturers with additional runtime protection and monitoring capabilities, which they can implement with minimal complexity and zero performance compromises.”
VP, Dependable Embedded Systems at the Linux Foundation
“All attacks NXP crafted were blocked by Sternum with CPU overhead of less than 3%. Sternum’s ability to successfully addresses runtime attacks is a valuable addition to many of NXP products.”
Senior Security System Architect and Fellow at NXP Semiconductors
“We were searching for a solution that delivered advanced security and monitoring capabilities. Sternum provided us exactly with what we needed, all with an effortless integration and without any negative impact on performance.”
Head of Product at Vibrant
“We have long admired Sternum, for its unique ability to provide remote analysis of firmware runtime. Access to this technology improves our IoT offering and helps our partners deliver more reliable and competitive IoT products and services.”
CEO and co-founder at HARDWARIO
“Seamless baked-in security with none of the added investment or complexity. Sternum alerts users to any attempt to compromise one of their deployed devices, providing early security intelligence.”
Dr. Mihai Voicu
CISO at Telit