A leading expert in cybersecurity technologies for embedded systems and cloud device management platforms, Trusted Objects Launches a New IoT Device Protector to-protect an industry-unique software-protected feature.
The new IoT device protector to-protect is a simplified technology platform that enhances the security of IoT devices using generic microcontrollers (MCU). It makes establishing a trust chain in the IoT ecosystem easier and can be used as a Root of Trust (RoT) to provide security services throughout the device life cycle.
The Chief Security Architect at Trusted Objects, Vincent Dupaquis stated “With this new release of to-protect, the IoT ecosystem is taking a major step toward more embedded security and a wider range of security services at the device level. It is a smart technology to simply and rapidly integrate security into new and existing IoT applications.”
As the adoption of IoT increases, the approach grows at a tipping point where security becomes a top consideration for both developers and users. There is a rising expectation that IoT devices would be protected from security assaults and that the security services provided by IoT devices will include a Root of Trust (RoT).
The 2.0 new release provides further security countermeasure capabilities against the most advanced logical and physical threats, including side-channel threats and fault injection, for both new and existing applications. A Level 3 certification for the Security Evaluation Standard for IoT Platforms (SESIP) is in the works.
Benefits of to-protect for IoT device developers:
- Quick download into any generic MCU (ARM Cortex, RISC V) without changing the IoT hardware platform design
- Easy security integration into devices that are already in use (retrofit).
Trusted Objects launches IoT Device Protector to-protect that has already been ported to a variety of platforms, including STMicroelectronics’ STM32 and Espressif’s ESP32 series, proving the solution’s ease of integration and security benefits.