EBV presents: Infineon OPTIGA™ product family
Scalable, easy-to-integrate hardware-based security solutions for your embedded project
Embedded systems are making their way into more and more areas of our daily lives. Trends such as the Internet of Things (IoT) and machine-to-machine communication (M2M) mean that a growing number of devices and machines are being connected. Some of these are as small as household appliances but some as large as complex, industrial automation systems. Regardless of size, they are all controlled by dedicated, embedded computing systems.
All of this networking brings a host of new opportunities for companies through new business and service models. It also means more convenience and comfort for users. However, security in this embedded world is not cessarily keeping pace. The attack surface is widening rapidly, exposing sensitive data and IP, and threatening process integrity and business continuity.
For DC charging for electric vehicles we recommend OPTIGA™ Trust E delivering sophisticated embedded system protection as well as OPTIGA™ TPM (Trusted Platform Module) protecting device and system integrity and authenticity in embedded networks. Click here to read more about DC EV charging.
OPTIGA™ rises to the challenge
Infineon has developed a feature-rich family of security solutions specifically for embedded systems. Designed for ease of integration, OPTIGA™ hardware-based solutions meet individual and evolving needs by scaling from basic authentication use cases to advanced security designs. Both OPTIGA™ Trust and OPTIGA™ TPM suites provide proven and reliable performance for embedded applications while maximizing return on investment.
Spotlight on embedded security- Keeping up with the Internet of Things
Embedded systems are becoming ubiquitous. Trends such as the Internet of Things (IoT) and machine-to-machine communication (M2M) mean that the number of connected devices and machines is increasing. Many of these – from small household appliances through large communication networks to complex, industrial automation systems – are controlled by special-purpose, embedded computing systems.Download Brochure
EBV is now listed as preferred security partner
Here at EBV, we are constantly preaching that security needs to be an essential part of every connected application and device. Headlines and events like the discovery of security flaws affecting millions of processors of different manufacturers are no reason to give up. Such happenings encourage us to find new ways of delivering our message to our customers and also to users and consumers in the market.
Connectivity is vital for a vast number of modern devices and at EBV we embrace innovation in order to create a sustainable and exciting future. However, with the rising number of connected applications, we also encourage hardware designers to consider security early in the design process. In order to support our customers, we are going the extra mile to create and offer solutions that make the integration of security chips as easy and flexible as possible.
Those endeavors have recently resulted in the industry’s first programming and personalization services for security hardware tailored to distribution customers and volumes. Within this initiative, we have worked closely together with Infineon and Data IO in order to set up a process and environment in our warehouse to personalize Infineon OPTIGA™ Trust E devices with custom OEM certificates.
Since Infineon and EBV share the passion for innovation that is based on secure and proven hardware we are happy to announce that our cooperation has now resulted in EBV’s participation in the Infineon Security Partner Network. We are proud to be on Infineon’s preferred security partners list and to generate value together that directly serves our customers and ultimately the consumers and users in the market.Read blog article
The Role of Security in the New Era of IoT Innovations
IoT devices have become the enablers of a new era of innovations adding a significant value to the global economy. This goes nevertheless hand in hand with new security threats. We will analyze these threats, and the importance of addressing security from the very beginning with the OPTIGA™ Trust X. Attendees will also learn about EBV’s key and certificate generation services