Search Solutions  
18 "IoT Security" Solutions

Arm Kigen Sim Solutions
Arm Kigen provides a portfolio of Subscriber Identity Module (SIM) solutions built on the latest cellular standards and specifications.

Arm Platform Security Architecture (PSA)
The Platform Security Architecture (PSA) is a holistic set of threat models, security analyses, hardware and firmware architecture specifications, and an open source firmware reference implementation.

CryptoManager IoT Device Management
The CryptoManager IoT Device Management is a turnkey security service that provides IoT OEMs and service providers an easy to use security solution from device-to-cloud.

eSecure module for SoC security for IoT
Secure Boot | Firmware update in the field | Secure key storage | Cryptography algorithms off-loading

IPsec Engine
On OSI layer 3 (network layer), IPsec is the transport security protocol of choice. The BA454 is a very scalable engine implementing the IPsec standard for high throughput applications.

Kigen SIM solutions
The Arm Kigen product family provides a portfolio of Subscriber Identity Module (SIM) solutions built on the latest cellular standards and specifications. These solutions are applicable to 2G/3G/4G networks, as well as IoT-Focused networks such as NB-IoT/LTE-M and future 5G networks.

Mbed TLS
Arm Mbed TLS makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal code footprint. It offers an SSL library with an intuitive API and readable source code, and includes an elaborate test suite. You can build it out of the box on most systems, or manually select and configure features.

Provisioning Platform
Inside Secure Provisioning Platform allows production line certificate generation and tracking to ensure the integrity of the manufacturing and licensing process.

Secure True Random Number Generators for IoT
True Random Number Generators (TRNGs) are typically deployed in semiconductors for secure data communications, secure electronic transactions, and secure data storage.

BROADKEY - Hardware Root of Trust Software to Create, Wrap and Manage Keys
BROADKEY™ is a secure key management software solution for IoT security, based on SRAM PUF technology.

Citadel - SRAM PUF-Based Key Provisioning System
CITADEL is the worlds first SRAM PUF-based key provisioning system designed to keep pace with the growing demand for the generation, distribution, and protection of cryptographic keys for IoT applications.

Content Protection (HDCP) 2.2/2.3 embedded security modules (ESMs) for HDMI, DisplayPort, and USB 3.x Type-C interfaces

Synopsys offers highly integrated and proven security solutions spanning silicon cores to embedded software to help content owners, service providers, network operators, embedded system OEMs and So...

Cryptography IP solutions, Public Key Accelerators (PKAs) and True Random Number Generators (TRNGs)

Synopsys offers a broad portfolio of silicon-proven DesignWare® Cryptography IP solutions that includes symmetric and hash cryptographic engines, Public Key Accelerators (PKAs) and True Random ...

NeoPUF - an ideal security solution for IoT
NeoPUF technology stands out for its features of ideal randomness and an entropy pool of random bits up to 1024 kbits. In addition, the security functions are statistically-tested robust and reliable, unaffected by external influences including temperature and voltage. NeoPUF can be implemented in logic compatible process and does not require additional masks or process adaption. This specialty IP enables upgraded security due to the intrinsic randomness and self-encrypted feature.

Security Protocol Accelerators provide increased performance, ease-of-use, and advanced security features

Synopsys offers two Security Protocol Accelerator (SPAcc) IP products:

- DesignWare® Multipurpose Security Protocol Accelerator (Multipurpose SPAcc)

- DesignWare LTE Security Prot...

tRoot Hardware Secure Modules (HSMs)

The DesignWare tRoot Hardware Secure Modules (HSMs) offer silicon-proven, self-contained security solutions with Root of Trust for a wide range of applications, including IoT, industrial control, n...

Robust Embedded Security Solutions for Industrial Applications
One of the most critical requirements for industrial IoT applications is to provide security for devices that must be controlled remotely.

Cryptographic IP Cores for IoT
The Intrinsix Cryptographic Subsystem IP Cores for IoT provide a complete security solution for your IoT ASICs and SOCs.


Partner with us


List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2021 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.