Security at every step of the device lifecycle
In the Internet of Things, information networks are not only getting bigger, they are also becoming more powerful, distributed and heterogeneous. These trends are adding layers of complexity and diversity to the underlying ICT supply chains.
To ensure the integrity, security, resilience and quality of products and services as they move through the supply chain, IT managers need to be able to track and manage the entire lifecycle. Steps in the lifecycle management process include product design and development, manufacturing (OEMs), provisioning, third-party installation, device activation/reactivation/deactivation, device maintenance, device firmware updates and device recalls/retirement. Lack of visibility in these steps can result in delays, system failures and loss of business.
Security built to last
Our OPTIGA™ Trust P and OPTIGA™ TPM families build a root of trust in computing devices, providing a strong crypto-based tracking system capable of logging all changes to the device during its lifecycle and managing access rights. This can help administrators to identify untrustworthy hardware or software in the supply chain, and prevent it from being integrated into their network – either intentionally or maliciously.
Benefits at a glance
- Lifecycle security for IoT devices as they move through the supply chain
- Reassurance for service providers thanks to authentication of secured microcontrollers
- Peace of mind for users at all stages of the device lifecycle
Find an answer to your question
Technical Assistance Center (TAC)
Infineon welcomes your comments and questions.
If you have any questions concerning our products, please fill out the following form. Your inquiry will be sent to the appropriate specialist who will be in touch with you as soon as possible.
You will receive a confirmation E-mail to validate your address in our system. Any attached file to the reply which will help to support your inquiry is highly appreciated.