Rise of cloud computing
Cloud computing provides the tools and technologies to build data-intensive parallel applications more affordably than traditional techniques. Furthermore, clouds can offer the bandwidth to build artificial intelligence through data aggregation and analysis. Many Internet of Things (IoT) devices (nodes) can connect to different servers quickly and efficiently over the cloud.
Given these benefits, many global corporations are migrating business processes to cloud solutions that offer high scalability and cost-effectiveness within an infrastructure that is agile and adaptive to their specific needs. Cloud providers offer cloud services and intelligence for edge servers and devices, such as on-premise gateways. These devices are connected to a multitude of IoT end points in environments such as smart infrastructures, smart cities, smart factories and smart homes.
Security remains the key enabler for cloud service adoption.
With millions of devices connected to the IoT, both manufacturers and consumers need to be sure that the identity of each and every device is genuine. Trusted device identities form the very basis for secured cloud connectivity and cloud computing. Therefore device identities need the best protection possible.
Moving customer IP and confidential information from on-premise equipment to the cloud or edge exposes that sensitive data to higher risks, for instance in the Industrial IoT. In simple terms, attackers have easier access to data that is aggregated and analyzed at the edge or in the cloud. The same applies to smart homes as they move more and more data to gateways and routers.
Device manufacturers are thus challenged to protect both the identity and integrity of cloud-connected devices, whether they be compute-intensive edge devices, consumer devices or IoT end nodes such as sensors. This protection is essential to enable secured zero-touch provisioning and secured lifecycle management of IoT devices.
Overcoming today’s cloud security challenge
The necessary level of protection can only be achieved by combining software security mechanisms with robust hardware-based security capabilities based on globally accepted industrial and IT security standards.
Here at Infineon, we deliver hardware-based security solutions designed specifically to harden the identity and protect the integrity of cloud- and edge-connected devices. These solutions serve the entire cloud ecosystem from cloud service and platform providers through manufacturers of ICT server equipment and high-power edge devices such as gateways to designers of connected industrial and consumer IoT devices and IoT end nodes such as sensors.
Hardened device identities for secured connectivity to the cloud
Our OPTIGA™ portfolio of security solutions provides the strongest form of identity and integrity protection, secured key provisioning and lifecycle management of cloud-connected edge and end-point devices. Through their rich encryption functionality, our OPTIGA™ TPM security controllers offer robust protection for critical data and processes residing on cloud servers, edge servers and high-power edge devices. OPTIGA™ Trust X is ideally suited to securely connecting end nodes to trustworthy edge devices and to cloud networks.
Cloud connectivity based on our solutions is faster and more secure.
Integration and deployment made easy
All of our OPTIGA™ products are characterized by ease of integration and compliance with rigorous cloud security standards. Standout features include lighter-weight host code for easier deployment, ready-to-use toolkits and open-source software stacks.
Reflecting our commitment to ease of deployment, we complement our best-in-class hardware with a software development environment that simplifies the integration and secured delivery of IoT applications for customers.
Our security solutions are being validated by leading global cloud service providers to confirm ease of integration and optimum interoperability in their platform architectures.
S2GO SECURITY OPTIGA™ Trust X
Infineon’s Shield2Go Security OPTIGA™ Trust X boards offer a unique customer and evaluation experience – the boards are equipped with one OPTIGA™ Trust X security chip and come with a ready to use Arduino library.