Send us a message and we will get back to you shortly
You asked. We listened. Here are our answers to the most common questions from customers:
Trusted Platform Modules (TPM) are the most popular hardware security modules (HSM), widely adopted in personal computers, workstations, network equipment and servers. Nowadays, there is a trend of integrating TPM 2.0 solutions in embedded systems, such as Medical, Industrial and Internet of Things products. Because of the TPM's high security guarantees and features.
Security solution conforming to the ISO/IEC 11889:2015 standard.
Arm TrustZone technology is used on billions of application processors to protect high-value code and data. Arm TrustZone technology offers an efficient, system-wide approach to security with hardware-enforced isolation built into the CPU. Systems need dedicated software (firmware) to make use of TrustZone.
3 to 9 months depending on your security needs and capabilities. If you are unsure of your security needs, please consider using our IoT Security Builder to quickly evaluate and decide among proven security solutions we offer.