www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...

prpl Foundation Announces Formation of Security Working Group to Define Open Framework Addressing Next Generation Security Requirements of Future Connected Devices

SANTA CLARA, CA, Mar. 17, 2015 – 

The prpl Foundation, an open-source non-profit foundation focused on enabling next-generation datacenter-to-device portable software and virtualized architectures, today announced the formal organization of its Security PEG (prpl Engineering Group). The formation of the Security PEG follows months of intensive planning by a subset of prpl members dedicated to defining an open security framework for deploying secured and authenticated virtualized services in the IoT and related emerging markets.

Founding members of the Security PEG include Broadcom, CUPP Computing, Elliptic Technologies, Ikanos, Imagination Technologies, Imperas Software, Ingenic, Kernkonzept, Lantiq (recently acquired by Intel, subject to customary regulatory approvals), Qualcomm Atheros, Inc., a subsidiary of Qualcomm Incorporated, Seltech, and others. Each company will contribute members to the Security PEG and its ongoing development efforts.

The new Security PEG will define a security roadmap to get from today's software-virtualized solutions to full hardware supported virtualization, enabling multi-domain security across processors (CPUs, GPUs, NPUs), heterogeneous SoCs and systems built on these technologies including connected devices, routers and hubs. In addition, the Security PEG will define necessary open APIs (application programming interfaces) for various levels of the security stack.

"There is keen interest from companies in a variety of vertical segments in the concept of using hardware-assisted virtualization to provide multiple independent secure domains that are isolated from one another for security, reliability, and ease-of development and deployment purposes," said Art Swift, president of the prpl Foundation.

Swift said there are "several use cases" that could see immediate benefit from multi-domain virtualization-based security, including:

The formation of the prpl Security PEG closely follows the formation of the prplWrt PEG, which is committed to a close collaboration between users, hardware manufacturers, semiconductor companies, and the broader OpenWrt ecosystem to create technology enhancements that support a robust, flexible open source platform suitable for mission critical, highly reliable products using a wide variety of hardware platforms.

Supporting Quotes

Broadcom
"Broadcom has been a pioneer in the deployment of hardware assisted virtualization in networking and datacenter applications and we look forward to expanding the use of virtualization across more applications. Our customers want to deploy services quickly and securely, independent of the ISAs involved. We are delighted to engage with the prpl Foundation to build a foundation of security for a diverse, heterogeneous world where virtualized services will play an increasingly important role."

- Dan Marotta, Broadcom Executive Vice President & General Manager,
Broadband & Connectivity Group

Elliptic Technologies
"I am thrilled to join prpl's extensive roster of technology innovators to help drive integral security principles. As we look into 2015 and beyond, the success of technology advancements depends on trust, and it's imperative that we take a holistic approach to security as we confront the dynamic threats to devices as they relate to the IoT, gateways, big data and the cloud. I look forward to working with this thoughtfully formed team of experts."

- Mike Borza, CTO, Elliptic Technologies

Imagination Technologies
"Secure deployment of multi-domain virtualized services on heterogeneous SoC platforms such as those using our MIPS CPUs and PowerVR GPUs and other processors will become critically important in the IoT, consumer multimedia and other emerging markets. Existing two-zone security solutions will not be sufficient; multi-zone deployments will become essential and commonplace. Companies need a foundation of certainty on which to build their applications and services that is future-proof and tackles the real-world issues. prpl provides the perfect forum for collaboration to achieve a portable, scalable solution for all stakeholders."

- Tony King Smith, EVP-Marketing, Imagination Technologies

Imperas Software
"Our customers see a real need and demand for industry-wide solutions addressing secure hypervisors, operating systems, firmware and applications. Imperas is excited to participate in the Security PEG to help enable a standard framework and APIs for security based on hardware supported virtualization."

- Simon Davidmann, CEO, Imperas Software

Lantiq
"Lantiq is strongly committed to developing and delivering technologies that provide high value to carriers around the world. The development of an open and secure virtualization framework for the Internet of Things will mark a significant step forward in the rush to deploy this exciting new technology. We believe hardware based security and virtualization along with true quality of service are key in delivering best in class and ultra-fast broadband solutions, like our recently announced GRX350 network processor , that smartly combines these key features."

- Dan Artusi, CEO, Lantiq

About prpl
prpl (pronounced "Purple") is an open-source, non-profit foundation focused on enabling next-generation datacenter-to-device portable software and virtualized architectures.

prpl represents leaders in the technology industry investing in innovation in efficiency, portability and compatibility for the good of a broad community of developers, businesses and consumers.

Initial domains targeted by prpl include data center, networking & storage, connected consumer and embedded/IoT. See: www.prplfoundation.org.

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.