{"id":915,"date":"2017-08-04T20:01:08","date_gmt":"2017-08-04T20:01:08","guid":{"rendered":"https:\/\/www.wolfssl.com\/?page_id=915"},"modified":"2025-03-04T16:51:38","modified_gmt":"2025-03-04T23:51:38","slug":"case-studies","status":"publish","type":"page","link":"https:\/\/www.wolfssl.com\/docs\/case-studies\/","title":{"rendered":"Case Studies | Documentation"},"content":{"rendered":"
\n
\n\t

CASE STUDIES<\/h1>\n

Through use in games, databases, sensors, VoIP application, and more there is over 5 Billion copies of wolfSSL products in production environments today - a ecosystem that is very dynamic and ever increasing.
\n<\/span><\/p>\n

Below you will find some of the areas that wolfSSL products are being used. As a matter of policy, wolfSSL does not disclose user company or project names unless those companies have publicly unveiled their use of our products.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>

Internet of Things (IoT)<\/h3>\n
\n\t

As devices, appliances, and modules are rapidly being connected to the Internet as part of the Internet of Things, or \u201cEmbedded Internet\u201d, wolfSSL and wolfCrypt are used to secure several areas of this evolving landscape.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div>