With a wide range of award-winning software and hardware solutions along with over 450 patents and patents pending worldwide covering key aspects of Elliptic Curve Cryptography (ECC), Certicom, a wholly owned subsidiary of BlackBerry Limited (Nasdaq: BBRY; TSX: BB), protects billions of dollars worth of content and millions of devices around the world.
As the world-leading expert in public key infrastructure implementations, device security, anti-counterfeiting, product authentication, asset management, and fixed-mobile convergence, many of the largest companies and government agencies rely on Certicom technology to secure applications, communications, and mobile devices while protecting content and other critical assets.
The combination of best-in-breed technology with high-quality products has led industry-leaders - IBM, Continental Airlines, Aristocrat Technologies, Cavium, General Dynamics, Motorola, Oracle, Research In Motion (RIM), Unisys, XM, Bally Technology, General Electric, Texas Instruments, Qualcomm, Mitre, L-3, Phillips, Samsung, Sony Ericsson, and Nortel - to become Certicom customers.
In recognition of the company’s expertise, Certicom received the 2006 Private Sector Leadership in Advanced Technology Award for innovation, expertise and leadership in security from the Canadian Advanced Technology Alliance (CATA).
Founded in 1985, Certicom’s corporate office is located in Mississauga, Ontario, Canada.
At Certicom, we are committed to establishing trust for our customers through open, standards-based, security technology that withstands the test of time. Since 1985, we have been developing public-key technologies and today we are regarded as the undisputed leader in elliptic curve cryptography (ECC). Our security solutions - used to protect content, applications and devices - are unrivaled in strength, transparency and flexibility.
Certicom expertise is grounded with a pedigree that is second to none. ECC is a fundamental part of Certicom, our research, the technology we develop and our vision that one day ECC will protect devices and applications everywhere. To accomplish this, we must achieve three goals: