www.design-reuse-embedded.com
Search Solutions  
OK
20 "Security Platform" Solutions

1
Device Secure Debug
The Joint Test Action Group (JTAG) is the IEEE1149.1 Standard Test Access Port (TAP) and Boundary Scan Architecture. Giving a full access to the internal system components of the device, the TAP inter...

2
eSecure : Single module for multiple security challenges
The eSecure IP is a complete standalone module that enables security applications by shielding the secret information from the non-secure application running on the main processor.

3
Hardware Security Module (HSM)
The HSM IP module is a Hardware Security Module for a wide range of applications. It is developed, validated and licensed by Silex Insight (partner of Xilinx) as an FPGA-based IP solution dedicated to the Xilinx Zynq UltraScale+ MPSoC platform.

4
Inside Secure Root-of-Trust
Designed to be integrated in power constrained microcontroller or complex SoC, Inside Secure Root-of-Trust Engine is the vault that guards the chip most sensitive assets and that establishes the platform security foundations.

5
integrated Secure Element (iSE) for multiple applications - Hardware Security Module (HSM) - Security Enclave - Security Subsystem
As part of Secure-IC s iSSP (integrated Security Service Platform), Secure-IC is able to provide integrated Secure Elements (iSE) that can act as trust anchors that protect the security assets of a de...

6
Laboryzr

LABORYZR introduces you a ready-to-use complete embedded systems evaluation laboratory with engineering training. Both classes of analysis are covered: Passive (Side-Channel Analysis-SCA) and Activ...


7
Payments and Tokenization
As an industry leader in tokenization solutions for online, mobile, card and account-based transactions, the family of Rambus Payment solutions provides comprehensive solutions for banks, financial institutions and retailers alike.

8
Post silicon security evaluation tool - Analyzr
ANALYZR supports common embedded systems technologies, including: FPGA, ASIC or End-Device. It allows the security assessment of any type of implementation. This could be: - A cryptographic module:...

9
Pre-silicon security evaluation tool - Virtualyzr
Through the VIRTUALYZR tool we present an innovative way to verify the security of the design at the pre-Silicon level. Such an early stage verification of the security can be seen as new Electronic D...

10
Programmable Root-of-Trust Engine
Inside Secure Programmable Root-of-Trust features a RISC-V 32-bit CPU and is delivered with its application development framework.

11
Root-of-Trust Engine
Root-of-Trust Engine, formerly known as Vault-IP,is a Silicon IP developed to protect the SoC platform and its operation so it can securely boot SoCs and protect sensitive key material and assets.

12
Software security evaluation tool - Catalyzr
The security evaluation of a software implementation is crucial as most of the devices today are running several applications that manipulate sensitive information such as user identity or payment cre...

13
Verimatrix ProtectMyApp Service
Simply upload your final, compiled app for protection and receive a secured version back - ready to publish to the app store of your choice.

14
GEON Security Platform
The GEON™ Security Platform, the essential suite of hardware security IP, is the natural response to support design teams across a wide spectrum of chip designs and industries.

15
Bus Sentry

Next-generation hardware-based cybersecurity product that can be used to detect, block and record cyber-attacks in a broad range of applications – from vehicles and factory robots to consumer...


16
Embedded Analytics Security infrastructure
Tessent Embedded Analytics allows SoC development teams to build an entirely new level of security functionality into their SoCs. Embedded Analytics on-chip monitors watch for unexpected behaviors suc...

17
PUFrt - PUF-based Hardware Root of Trust
With PUF as the core, the root of trust provides a foundation of trust and security for the chip system. It also provides a 1024-bit identification code with a physical unclonable function and a true random number generator that complies with the NIST SP800-90B/SP-800-22 standard specifications.

18
tRoot Hardware Secure Modules (HSMs)

The DesignWare tRoot Hardware Secure Modules (HSMs) offer silicon-proven, self-contained security solutions with Root of Trust for a wide range of applications, including IoT, industrial control, n...


19
Fast, Compact, Ultra-Low-Power Cryptographic Tools
Quickly and easily embed our fast, small-footprint, ultra-low-power cryptographic solutions in your IoT devices.

20
Verimatrix WhiteBox
Verimatrix's WhiteBox enables you to build, control and trust your own software crypto-security.

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2021 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.