What is cloud-based security lifecycle management for connected objects and why is it important?
Connected device architecture is no longer an evolving concept. With the maturation of this methodology in today’s Internet of Things (IoT), new challenges are uncovered as the market compels vendors to innovate in the amount of services provided at the edge. Vendors and OEMs, in turn, are making end-user services more sophisticated, increasing the security spectrum of this framework. The need to update the firmware/software stems from the obsolescence of device security measures and improved services, and additionally are regulatory requirements, such as in the standards EN 303645 (Europe) and NIST SP 800-193 (USA). To mitigate the growing threats and vulnerabilities in the field and protect end-user devices from cyberattacks at both the network and device levels, a new strategy is needed to filter attacks in real time and implement a centralized protection mechanism for all connected modules.
Secure-IC addresses this problematic with its new SecuryzrTM iSSP, a unique Cybersecurity lifecycle management platform for connected objects.
To read the full article, click here
Related Semiconductor IP
- Process/Voltage/Temperature Sensor with Self-calibration (Supply voltage 1.2V) - TSMC 3nm N3P
- USB 20Gbps Device Controller
- SM4 Cipher Engine
- Ultra-High-Speed Time-Interleaved 7-bit 64GSPS ADC on 3nm
- Fault Tolerant DDR2/DDR3/DDR4 Memory controller
Related Blogs
- The Growing Importance of PVT Monitoring for Silicon Lifecycle Management
- QuiddiKey: A Single Cryptographic Solution for the Lifecycle of a Connected Device
- How Silicon Lifecycle Management Strengthens HPC and Data Center Reliability
- SiFive Upgrades Automotive Security for the RISC-V Ecosystem with New ISO/SAE 21434 Certification
Latest Blogs
- Shaping the Future of Semiconductor Design Through Collaboration: Synopsys Wins Multiple TSMC OIP Partner of the Year Awards
- Pushing the Boundaries of Memory: What’s New with Weebit and AI
- Root of Trust: A Security Essential for Cyber Defense
- Evolution of AMBA AXI Protocol: An Introduction to the Issue L Update
- An Introduction to AMBA CHI Chip-to-Chip (C2C) Protocol