27% of enterprise IT and business decision makers indicated a supplier’s proven security capabilities are the top factor in their selection criteria, according to IDC’s 2018 Global IoT Decision Maker Survey. And this strong preference for suppliers with a track record of strong security will only increase as the threat environment continues to evolve. There is a growing industry consensus that the path forward requires a philosophy of security by design with the implementation of device security anchored in hardware. Learn how hardware-based security can be harnessed to provide competitive advantage in a world where data is the most valuable commodity.
Root of Trust
Secure Silicon IP Series: When One is Not Enough: Multiple Roots of Trust (Part Three)
With a hardware root of trust, security protocols and applications can be run within a secure perimeter of an SoC, keeping keys and security assets protected from unauthorized access. This session will discuss how a secure co-processor with multiple roots of trust allow different entities or applications to have their own “virtual” security core in the SoC, but each with a private security domain.
Secure Silicon IP Series: Will the Real Root of Trust Please Stand Up? (Part Two)
In simple terms, a root of trust is the security foundation for a system-on-a-chip (SoC) or electronic system. Any functionality that needs to be secure relies in whole or in part on that root of trust. However, the term “root of trust” means different things to different people. In some cases, a root of trust is thought to be a single key that was either provisioned to a device or generated by the device itself. In other cases, a root of trust is seen as code, usually boot code, that is immutable and considered always trusted. A newer definition of a root of trust is a hardware module embedded in a chip or system that provides security functionality that keeps the entire chip or system secure.
Secure Silicon IP Series: Complexity vs. Security (Part One)
This webinar will explore some of the threats facing SoC and processor designers and how can SoCs be architected for both performance and security.
