Lanner Electronics Inc. (TAIEX 6245) is a world-leading hardware provider in design, engineering, and manufacturing services for advanced network appliances and rugged industrial computers. Lanner provides reliable and customizable computing platforms with high quality and performance. Today, Lanner has a large and dynamic manpower of over 1100 well-experienced employees worldwide with the headquarters in Taipei, Taiwan and subsidiaries in the US, Canada, and China.
Lanner creates customized network appliance for client applications with managed manufacturing process thanks to our in-house design and manufacturing services, covering color of chassis, height, modular or fixed port, BIOS, IPMI, acceleration cards, special certification and additional I/O interface. Lanner’s building block design concept can fulfill all your requirements.
Lanner's contribution to the Infineon Security Partner Network
TPM 2.0 is not limited to addressing the need to have dedicated hardware security on the motherboard but using the processor more and relying more on the firmware, where making libraries available will enable the options that apply to the platform we are using.
With the OPTIGA™ TPM from Infineon, Lanner now can add an extra layer of security to the data. TPM 2.0 along with Lanner LAN Bypass technology available in Lanner in network appliance and industrial PC can offer robust hardware level cyber-hardening at low power consumption. TPM 2.0 enabled crypto security in Lanner hardware is especially important for vertical markets, like network security, uCPE/vCPE for SD-WAN, transportation and industrial cyber security.
Lanner is one of the major hardware solutions companies, focusing on building highly customizable network security appliances for software partners in ISPN.
TPM 2.0 Protected IIoT Security Gateway for Industrial Control Systems
To secure millions of Industrial Internet of Things (IIoT) endpoints, controllers and gateways in complex environments, a comprehensive IIoT edge security platform should be equipped with hardware root of trust on each device, gateway and controller, with a mutual authentication between device and gateway as well as with a secured communication overlays design.