Rise of cloud computing
Cloud computing provides the tools and technologies to build data-intensive parallel applications more affordably than traditional techniques. Furthermore, clouds can offer the bandwidth to build artificial intelligence through data aggregation and analysis. Many Internet of Things (IoT) devices (nodes) can connect to different servers quickly and efficiently over the cloud.
Given these benefits, many global corporations are migrating business processes to cloud solutions that offer high scalability and cost-effectiveness within an infrastructure that is agile and adaptive to their specific needs. Cloud providers offer cloud services and intelligence for edge servers and devices, such as on-premise gateways. These devices are connected to a multitude of IoT end points in environments such as smart infrastructures, smart cities, smart factories and smart homes.
Security remains the key enabler for cloud service adoption.
With millions of devices connected to the IoT, both manufacturers and consumers need to be sure that the identity of each and every device is genuine. Trusted device identities form the very basis for secured cloud connectivity and cloud computing. Therefore device identities need the best protection possible.
Moving customer IP and confidential information from on-premise equipment to the cloud or edge exposes that sensitive data to higher risks, for instance in the Industrial IoT. In simple terms, attackers have easier access to data that is aggregated and analyzed at the edge or in the cloud. The same applies to smart homes as they move more and more data to gateways and routers.
Device manufacturers are thus challenged to protect both the identity and integrity of cloud-connected devices, whether they be compute-intensive edge devices, consumer devices or IoT end nodes such as sensors. This protection is essential to enable secured zero-touch provisioning and secured lifecycle management of IoT devices.
Overcoming today’s cloud security challenge
The necessary level of protection can only be achieved by combining software security mechanisms with robust hardware-based security capabilities based on globally accepted industrial and IT security standards.
Here at Infineon, we deliver hardware-based security solutions designed specifically to harden the identity and protect the integrity of cloud- and edge-connected devices. These solutions serve the entire cloud ecosystem from cloud service and platform providers through manufacturers of ICT server equipment and high-power edge devices such as gateways to designers of connected industrial and consumer IoT devices and IoT end nodes such as sensors.
S2GO SECURITY OPTIGA™ Trust X
Infineon’s Shield2Go Security OPTIGA™ Trust X boards offer a unique customer and evaluation experience – the boards are equipped with one OPTIGA™ Trust X security chip and come with a ready to use Arduino library.