Security for the Next One Trillion Devices
Arm-based chips are already in more than 100 billion devices, and as the Internet of Things (IoT) rapidly expands, we expect that number to grow to a global network of one trillion connected devices. Security cannot be an afterthought. It must considered at inception, and each threat addressed with the appropriate countermeasure. Arm has been helping the ecosystem secure devices from chip to cloud for many years, and remains committed to an end-to-end approach to security.
Global Reach, Global Ecosystem
Arm is at the epicenter of the world’s largest compute ecosystem. We are uniquely positioned to take a system-wide approach to security, applying the insights gained from over 100 billion Arm-based chips, and working with our partners to generate more trusted intelligent-learning capabilities on more devices at the edge. Our Platform Security Architecture (PSA), rallies the industry to adopt a common framework, shifting the economics of designing-in scalable security for connected devices.
Easy Access to Built-In Security
The true value of connecting a trillion devices lies in the seamless flow of trusted data between devices and from device to cloud. Security must remain invisible, yet always present, and never interfere with legitimate data flow. By embedding security in our architecture, designs, frameworks and products, and promoting industry standards through the PSA, we’re reducing friction and time-to-security across the design and development cycle.
Architects of a Secure Connected World
Arm has a strong history in security originating from our heritage of providing secure compute platforms for the mobile revolution. Arm technology has been used to secure smartcards, SIMs and other secure elements through to feature-rich secured devices in mobile handsets, tablet computers, DTVs, set top boxes and enterprise systems. We continue to build on that history, applying our expertise to new market requirements, including developer-friendly, deterministic, real-time embedded and IoT applications.
Solutions Ensuring Security from Chip to Cloud
As security attacks and threats continue to evolve, so must the methods to combat them. Arm provides an expanding portfolio of secure IP, firmware and software, collaborating with the ecosystem to provide the right counter-measures for the variety of threats now facing devices. Solutions include Arm TrustZone technology for Cortex-A and Cortex M processors, plus a range of Arm TrustZone-enabled CPUs. Also device management solutions, such as Arm Device Management and a wide suite of security IP, which includes a new set of products to protect against physical attacks. Arm Mbed OS, an open source embedded operating system delivers security throughout the device lifecycle.
As long as there is value in controlling a device or accessing its data, there will be a constant battle against potential attackers. Talk with an Arm expert to learn more about security technologies that can be designed into devices.
We asked 1,200 tech sector workers
what they thought about security
Sixty-seven percent (67%) thought most technology companies
did not regard security as fundamental. Arm believes this is a problem.
Protect Your Data Platforms from the Next Wave of Cybercrime
The latest Arm Security Manifesto 2018 shows a disturbing trend in the continuing rise of cybercrime, particularly vast armies of attack bots and elaborate global security offensives. Yet industry is under pressure to simplify IoT, even as the numbers of IoT devices and data streams multiply by billions every year.