Secure M.2 RoT Module

Secure M.2

Boost Your Platform Security with Hardware Root of Trust and Firmware Resilience

Promwad’s Secure M.2 Root of Trust (RoT) Module provides an immutable root of trust and platform firmware resilience (PFR) as defined by NIST SP 800-193. It secures the boot process and continuously protects, detects, and recovers critical firmware (BIOS, BMC, FPGA, etc.) from unauthorised changes.
Unlike fixed TPMs or SoC-integrated security, this hardware-isolated module is upgradeable and platform-agnostic. It provides a drop-in solution for improved firmware integrity and future-proof cryptography, all without the need to redesign the host system.

What Sets Our Module Apart

Compact package

Real-time SPI and I2C/SMBus filtering

simplified interface

Internal secure flash (UFM) for key storage

Low power consumption

Modular and flexible
M.2 form factor
 
Cost-effectiveness

HRoT-based secure boot and cryptographic signature validation

High-speed performance

Support for post-quantum cryptography (PQC) algorithms
 

Our Application Areas

Industrial PCs & edge
devices

Network infrastructure &
telecom

Automotive
ECUs

Aerospace, medical, and defense
systems
 

Server boards and high-assurance
embedded systems

Built on Lattice MachXO5-NX

The Lattice Sentry solution delivers Hardware Root of Trust (HRoT) functionality based on the MachXO FPGA platform. Its flexibility, combined with a comprehensive library of IP cores, enables the development of advanced and customisable security systems for a wide range of markets.

 

lattice logo

Our Tech Stack

NIST SP 800-164

Core HRoT behaviours for boot security, HRoT definition and usage

NIST SP 800-193

HRoT for firmware protection and recovery, platform firmware resilience

FIPS 140-3

Security requirements for cryptographic modules, mandatory for government/military, preferred in finance/telecom

Revenue Model & Our Role

Custom development for the client

adaptation to the customer’s platform

Integration with the customer’s platform

SoC, BIOS, OS bootloader, TPM, etc.

Subscription for security and PQC updates

for use in critical systems

Architecture and system design

of the module

FPGA firmware development

with HRoT, PFR, SPI/I2C filters

OEM delivery model

manufacturing via contract partners under the client's or our own brand

Security Gaps This Module Closes for Modern Platforms

Compact package

Requirement to protect firmware (BIOS, BMC, FPGA) from attacks
 
simplified interface

Transition from static TPM chips to a flexible, updatable solution
Low power consumption

Post-quantum
readiness
 

 

Cost-effectiveness

Compliance with regulatory standards (NIST SP 800-193,
FIPS 140-3)
High-speed performance

Independence from SoC vendors and their built-in security (including supply chain control)

 

Get early access to our Secure M.2 Root of Trust Module — submit your request today!

Drop us a line about your project! We will contact you today or the next business day. All submitted information will be kept confidential.