The latest Federal Trade Commission (FTC) ruling with regards to device security and user privacy shows that the embedded world is at a critical point directly before a monumental change. Read the press release here to see for yourself why security at the edge is important. The ruling contained many intense and striking qualities. One key take-away is a sharp statement from the FTC: “Manufacturers and sellers of connected devices should be aware that the FTC will hold them to account for failures that expose user data to risk of compromise.”
The most comprehensive edge computing and security platform
As more developers move carefully towards securing their embedded designs, they should consider the aspects of the security technology supplied by NXP’s EdgeVerse™ platform, the most comprehensive edge computing and security platform. NXP’s EdgeVerse platform brings together the building blocks for high-performance and energy-efficient compute through the industry’s broadest portfolio of scalable embedded processing that can power numerous edge applications within the industrial, IoT and automotive markets. From the simplest connected sensors, to the highest performing networking equipment (and even device cloud management), NXP provides solutions across the spectrum of processing and integration points for end-to-end security. NXP Technology Days events across the U.S. have highlighted this technology, as summarized in this presentation. Focusing on the outside limits of the Internet of Things, NXP microcontrollers and crossover processors have integrated security capabilities traditionally only realized on advanced application processors. To emphasize these capabilities there is a three-part webinar series around hardware-protected cryptographic keys. Check out the webinar series here.
Explore the implementation of hardware-protected keys
Hardware-protected keys are the standard for security protection of embedded designs. For the IoT device, the cryptographic keys used to perform services such as encrypted boot, onboarding, and over-the-air updates are critical components that must be protected. The webinar series explores the implementation of hardware-protected keys across NXP products.
- Part 1: Introduces the challenge of secure system design and different hardware-protected key options and then focuses on the broad-market i.MX RT crossover processor and software instantiated security
- Part 2: Overviews the state-of-the-art security integration of the latest LPC microcontroller, the LPC55S6xx with Arm® TrustZone® technology
- Part 3: Enumerates the essential keys for an IoT design and explains how they are protected using the LPC55S6xx MCU
This webinar series on protected cryptographic key options can be leveraged to align to today’s environment of growing expectations on technology providers.
NXP, the NXP logo and EdgeVerse are trademarks of NXP B.V. All other product or service names are the property of their respective owners. Arm, Cortex and TrustZone are trademarks or registered trademarks of Arm Limited (or its subsidiaries) in the US and/or elsewhere. The related technology may be protected by any or all patents, copyrights, designs and trade secrets. All rights reserved. © 2019 NXP B.V.