Layered Security for Your Next SoC

Arm provides a range of security IP products designed to protect against a variety of different attacks, even physical attacks. Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.

Features and Benefits
Vast Ecosystem

More than 1,000 software, tools and service partners to support and enable the use of our technology.

Standard Industry Framework

The Arm Platform Security Architecture (PSA) is the framework for a common security best practice.

Protection Against a Broad Spectrum of Attacks

Our IP extends across the system with protection for processors, subsystems, acceleration, and offloading—all fitting together seamlessly for layered protection.

Always Expanding 

Arm continues to build on its history in mobile security, addressing new market requirements for developer-friendly, deterministic, real-time embedded and IoT applications.

Security IP

Arm provides an expanding portfolio of secure IP, firmware and software, collaborating with the ecosystem to provide the right counter-measures for the variety of threats now facing devices.

Arm CryptoIsland Family

The CryptoIsland family of products provides Arm partners with a highly integrated security subsystem. This fully isolated subsystem provides a similar set of security services, with the addition of greater scope for programmability and reuse.

Arm CryptoCell Family

Arm CryptoCell enables the protection of assets (code and data) belonging to different stakeholders in an ecosystem (e.g. silicon vendor, OEM, service provider, user). CryptoCell enables SoC designers to trade off area, power, performance or robustness in a very flexible manner so that SoC designs can be optimized to achieve the most appropriate security level for the target market.

Physical Security Solutions

Arm's suite of physical security solutions empowers designers to build in the necessary physical protection at the heart of the device. The suite includes both processor IP equipped with tamper resistance, plus a range of IP specifically created to mitigate side-channel attacks.

TrustZone Technology for Processor IP

Arm TrustZone technology is a system-on-chip (SoC) and CPU system-wide approach to security with hardware-enforced isolation to establish secure end points and a device root of trust.

TrustZone Security System IP

Arm also has a range of Security System IP to provide multiple layers of processor and data protection.

Talk with an Expert

Our security expert team is here to help you.

Contact Us

Securing the Next 1 Trillion Devices

Arm’s security portfolio is designed to protect against a broad spectrum of attacks, allowing partners to deploy the security level that best matches their application needs. Achieving layered security involves implementing technologies, processes and measures designed to protect systems, networks, and data from a range of attacks. 

Learn More