Aleksandr Värä

Aleksandr Värä

Head of IoT

Technology innovations in IoT are here to stay. Connected devices throughout industries enable disruptive business models that deliver value throughout the product life cycle. The term ‘customer experience’ will take on completely new meaning, since it is crucial to create customer stickiness and learn as much as possible from users in order to continuously deliver the highest possible value over time.

As device connectivity is coming to people’s homes, cars, elevators, healthcare products and other sensitive parts of our lives, it is clear that ensuring customer security and privacy is a must. In order to gain customer trust and loyalty, investing in transparency and security is a winning strategy and enables significant differentiation when compared to competitors.

Nixu’s security engineering and secure R&D teams have decades of experience in IoT and connected, embedded devices. Our customers come from a variety of industries, with different business models, technologies and platforms. We enable your innovation by ensuring your success when it comes to securing your intellectual property, your customer data ecosystems and your privacy.

In order to succeed in our mission, we constantly employ the best professionals on the market and provide an environment with new professional challenges to ensure that our team of more than 300 people remains the best and our services are of the highest quality in Europe. Our customers have won prizes in IoT security, which enables us to keep up the good work and support our customers in their innovations.


Bug Bounty Program

It is often impossible to run a separate security audit for each production release. Most companies have an increasing number of services, applications and components listening to the network and available for partners, customers, employees and virtually to everyone. While this is great for business, the complexity or the exposed systems have gone - or will soon go - through the roof. A bug bounty program can help you manage the complexity in an agile manner - and we can run it for you.

A bug bounty program does not completely replace the need for more traditional assessments or security engineering work, but it cost-effectively complements them.

For your distinct need, we provide two models for running the bug bounty program.


Private Bug Bounty Program:

Our expert team helps to define the digital boundaries where external hackers are allowed to operate. It can be a single application or a network of hundreds of targets.

Our expert team with proved skills and track record in successful bug hunting starts going through digital space and searching for anything a malicious actor could use.

Once weakness is found and confirmed, we report it to you using the method most suitable for you.

We help respond to the flaws by providing Nixu’s competences. Regardless of the need – we are here to help.

And we keep on going as long as our contract remains in effect.

  • Quick guide on how to make IoT a security enabler
  • Aleksandr Värä

    Aleksandr Värä

    Head of IoT

Related blogs