WP_Term Object
(
    [term_id] => 20510
    [name] => Secure-IC
    [slug] => secure-ic
    [term_group] => 0
    [term_taxonomy_id] => 20510
    [taxonomy] => category
    [description] => 
    [parent] => 97
    [count] => 6
    [filter] => raw
    [cat_ID] => 20510
    [category_count] => 6
    [category_description] => 
    [cat_name] => Secure-IC
    [category_nicename] => secure-ic
    [category_parent] => 97
)
            
Banniere SIC SemiWiki V2
WP_Term Object
(
    [term_id] => 20510
    [name] => Secure-IC
    [slug] => secure-ic
    [term_group] => 0
    [term_taxonomy_id] => 20510
    [taxonomy] => category
    [description] => 
    [parent] => 97
    [count] => 6
    [filter] => raw
    [cat_ID] => 20510
    [category_count] => 6
    [category_description] => 
    [cat_name] => Secure-IC
    [category_nicename] => secure-ic
    [category_parent] => 97
)

Rugged Security Solutions For Evolving Cybersecurity Threats

Rugged Security Solutions For Evolving Cybersecurity Threats
by Kalar Rajendiran on 11-30-2023 at 6:00 am

Secure-IC security cybersecurity

Secure-IC is a global leader in end-to-end cybersecurity solutions, specializing in the domain of embedded systems and connected devices. With an unwavering commitment to pushing the boundaries of security innovation, Secure-IC has established a remarkable track record. Its credentials include active involvement in new standards development, extensive thought leadership, and an extensive portfolio of more than 200 patents. The company’s expertise spans the entire spectrum of cybersecurity, from cutting-edge cryptographic solutions to comprehensive testing frameworks, ensuring the safeguarding of digital assets against evolving threats. Secure-IC’s notable flagship product, Securyzr, exemplifies its dedication to adaptable solutions that meet dynamic cybersecurity demands, making it a trusted partner in securing the digital sphere. Secure-IC recently made a couple of exciting announcements, one relating to eShard and the other relating to MediaTek’s flagship smartphone chip, the Dimensity 9300.

Ruggedness of a Security Technology

The ruggedness of a security solution is directly related to the ruggedness of the security technology upon which the solution is based. It goes without saying that the ruggedness can only be established and ascertained by comprehensive testing of the security technology itself. The recent agreement between eShard and Secure-IC highlights how committed Secure-IC is to offering rugged security technology. The company announced a strategic acquisition of patents portfolio from eShard, a renowned pioneer in advanced security testing.

eShard

Known for its state-of-the-art solutions, software tools, and expert services, eShard specializes in providing comprehensive testing frameworks that enable the scalability of security testing. eShard’s expertise extends across various domains, including chip security testing, mobile application security testing, and system security testing. With a legacy marked by innovation and a robust patents portfolio, eShard continues to be a trailblazer in the field of advanced security, contributing significantly to the defense against cyber threats.

Secure-IC’s Acquisition of eShard Patents Portfolio

This marks a significant milestone in Secure-IC’s commitment to pushing the boundaries of security innovation and reinforcing its leading position in the embedded cybersecurity industry. With this acquisition, Secure-IC has expanded its patent portfolio to more than 250 in approximately fifty international patent families. The integration of eShard patents portfolio constitutes a substantial reinforcement to Secure-IC’s existing tunable cryptography product offering. Cybersecurity is a very dynamic field where adaptability and innovation are essential and this partnering will help secure the entire lifecycle of connected devices. This aspect takes on even more importance in the context of the European Union Cyber Resilience Act (EU CRA) coming into force, which mandates critical products to be designed secure and kept secure for an extended duration.

Secure-IC’s Securyzr iSE 900 as Trusted Anchor and Root of Trust

Secure-IC recently announced that its embedded cybersecurity solution Securyzr iSE (integrated secure element) 900 was integrated into MediaTek’s new flagship smartphone chip, the Dimensity 9300. This collaboration represents a significant leap forward in the realm of embedded systems and connected devices, setting new standards for security and performance. What sets Securyzr apart is its dual function as the Trusted Anchor and Root of Trust, allowing sensitive processes and applications to run in an isolated, secure area. This Secure Enclave plays a pivotal role in safeguarding critical operations throughout a device’s lifecycle, including Secure Boot, Firmware Updates, Key Management, and Cryptographic Services. Its continuous monitoring capabilities ensure resilience against potential disruptions, such as Cyber Physical Attacks, thereby mitigating potential threats with utmost reliability. As a result, the Dimensity 9300 is able to guard against evolving cybersecurity threats, setting a new standard for secure mobile threats.

Summary

Embedded within the main System-on-Chip (SoC), Securyzr offers a comprehensive suite of services to its host system, ranging from secure boot and cryptographic services to key isolation and anti-tampering protection. What sets Securyzr iSE 900 apart is its dual computation-and-strong-isolation aspect, providing an additional layer of security that surpasses traditional trusted execution environments.

Secure-IC’s expertise spans the entire spectrum of cybersecurity, from cutting-edge cryptographic solutions to comprehensive testing frameworks, ensuring the safeguarding of digital assets against evolving threats. The company’s flagship product, Securyzr, spotlights its dedication to adaptable solutions that meet dynamic cybersecurity demands, making it a trusted partner in securing the digital sphere.

For more details, visit the Securyzr product page.

Also Read:

Cyber-Physical Security from Chip to Cloud with Post-Quantum Cryptography

How Do You Future-Proof Security?

Points teams should consider about securing embedded systems

Share this post via:

Comments

There are no comments yet.

You must register or log in to view/post comments.