Amanda Lowe Director Product Marketing WindRiver, an Intel Company

Size: px
Start display at page:

Download "Amanda Lowe Director Product Marketing WindRiver, an Intel Company"

Transcription

1 October 26, 2017 Guy AlLee IoT Security Product Manager SSG Platform Security Division Amanda Lowe Director Product Marketing WindRiver, an Intel Company

2 ONBOARD ATTEST How long does it take to securely onboard 10,000 IoT lightbulbs? Onboard = From out-of-box to securely streaming data to an IoT Platform

3 Agenda Overview The Imperative: Secure and Scale IoT Security Fundamental #1 Immutable Identity with Intel Enhanced Privacy ID (EPID) Any Device into Any Cloud Intel Secure Device Onboard (SDO) Wind River Helix Device Cloud 3

4 Manual IoT Onboarding Today & now to type in the 256 character key on my cell phone on top a 20-ft. ladder how convenient... Device arrives on-site Technician installs, turns on device Manual provisioning IT backend accepts device credentials & connects it to device management system Device starts working Major Barrier for IoT - Only way we get to 50B devices by 2020 is automation. Tremendous ROI drag. Missing Element for Security - Must solve Mirai style attacks: ship default passwords for headless devices and users Privacy - Need to preserve device anonymity to prevent future attacks Traditional PKI Identity - Still has role to play for IoT but too heavyweight & costly to embed in hardware at scale Ecosystem wants automated SIM like approach that ties identity to platform initiated activation. Nobody solving! 4

5 Trust Rendezvous Service Intel SDO Target - for IoT Platform ISVs & CSP marketplaces whose customers are struggling with siloed & manual device provisioning Solution Secure Device Onboard provides a service that automates and secures the rendezvous of devices to their owner s control platforms Differentiation using a more scalable device enablement method that works for any IoT platform ecosystem Place, Power, Provision Solves major pain point in securely deploying IoT things Manual deployment, staging, & OEM pre-loads are not optimal and causing deployment delays Hardware root of trust EPID based service for zero touch device onboarding Tremendous ROI for customers & ecosystem SDO = adds SCALE to move POCs to production. INCREASES # of devices in use 5

6 Device Management Platforms Place, Power, Provision Intel s Zero Touch Device Onboarding Solution Will Scale IoT to Billions of Devices Takes seconds at power on Provisions dynamically to customer s IOT platform of choice Hardware secured Designed-in, ready for Device ODMs

7

8 Growing IoT Cyber Threats Not just Data Control & Life/Safety too! Stuxnet German Steel Mill Attack 2014 Jeep in Ditch 2015 BlackEnergy Ukrainian Power Grid Attack 2015 Mirai Botnet attack on Dyn 2016 WannaCry

9 IoT Security Is Essential to Scale IoT Deployments HW Security is an IOT Priority Barrier to IoT Adoption* Hackers exploiting poor device security New Specs Customer Requirement Most Important Items for IOT Platform* RFP Isolation & added protections of HW security has recognized role Pattern to secure & role of HW is defined HW security moving from shadows to key RFP request Security solutions Designed-in to HW are keys to accelerating adoption and scale *Gartner 2016 IoT Backbone Survey *Trusted Computing Group: What Embedded and IoT Developers Think About IoT Security 9

10 Designed in Foundation - Device HW Identity Intel Enhanced Privacy ID (Intel EPID) Target/key problem - For IoT device manufacturers and service providers who need to secure their IoT offerings Solution - EPID is the IoT Identity HW Root of Trust that immutably identifies an IoT device Differentiation Scales with IoT Preserves privacy Simplifies certificate management Supports distributed, direct device-to-service trust, eliminating a centralized, 3rd-party trust authority, with its single point of vulnerability and potential vendor-lock Pre-provisioned before 1st boot Use as a best practice identity for device onboarding to set up secure anonymous channel Open international standard created by world reknown cryptographers. Solves privacy for IOT 10

11 An Identity Model Created for IoT Proven at Scale Baseline Minimum HW Root of Trust Secure App Container TEE Attest SW HW Identity TCG/ISO standard with privacy preserving group authentication scheme- UNIQUE & IN-DEMAND Used to open secure, authenticated channel for remote attestation & authentication Prevents Attack Mapping- Protects device data vs PKI that reveals data to hack device Intel EPID EPID vs. PKI Traditional PKI Open source SDK Proven billion keys inherently distributed with Intel platforms 1-to-many key match, unique signature every time, anonymous 1-to-1 key match, standard signature every time Pvt-Key 1 Pvt-Key 2 Pvt-Key X Pvt-Key Enables customers to deliver many use cases where privacy & attestation are key requirements 11

12 EPID 2.0 Ecosystem Enablement Intel Trust Services Infrastructure Issuer (Intel) Certificate Path Validation Group Public Key Group Private Key Group Issuing Private Key Private Keys 1.. n Chip OEM Device OEM Revocation Lists Inherent Key Distribution EPID Attestation CLOUD SERVICE Member (Edge Device) Verifier 12

13 Device Requirements are Minimal Mandatory immutable key, stored securely 144 Bytes non-volatile, one-time programmable memory Protected in Trusted Execution Environment (e.g., TrustZone-based OP-TEE) Recommended True RNG Re-key strategy (e.g., 2 nd EPID key storage slot, validity flags) Optional performance optimization Signature Pre-computation value, protected as above. Crypto Acceleration HW 13

14 Device Onboard Service 14

15 How Secure Device Onboard Works Place, Power, Provision 15

16 Silicon Provider Intel SDO Secure Device Onboard (fab) (a) (b) (c) (d Ownership Transfer) EPID Identity GUID, Svc URL A s Public Key (=Ownership Credential) Ownership Proxy (accumulated ledger of ownership). Owner A g=123 OEM/ODM Board/Device Owner B Owner A g=123 Distributor/ Reseller Owner C Owner B Owner A g=123 Online Retailer IoT Platform Device Management Service (SDO Code) Here is my Ownership Proxy, I am Owner for GUID 123 Here is my EPID signature, Device GUID=123 Office NOC d cloud I manage Guid 123. I m available at this IP: Intel SDO Service (Rendezvous) Try GUID Hi, I am 123. Where is my management service? Device shipped separately from Ownership Proxy Office Install 16

17 Silicon Provider Intel SDO Device Onboarding (fab) (a) (b) (c) (d Ownership Transfer) EPID Identity GUID, SDO URL Ownership Credential Ownership Proxy (accumulated ledger of ownership). Owner A g=123 OEM/ODM Board/Device Owner B Owner A g=123 Distributor/ Reseller Owner C Owner B Owner A g=123 Online Retailer IoT Platform Device Management Service (SDO Code) Here are keys, certificates, IP/DNS addresses, data items, URLs, software/scripts, commands to configure yourself to Office NOC Here is info about me and/or certificate signing requests (CSRs) Office NOC d cloud Here are replacement SDO credentials in case I need them later. Now go connect to Office NOC GUID 123 encrypted channel 123 Office Install Device shipped separately from Ownership Proxy Intel SDO trust allows construction of encrypted channel between Mgt Service and Device. 17

18 Intel SDO Device Onboarding (fab) (a) (b) (c) (d Ownership Transfer) EPID Identity GUID, SDO URL Ownership Credential Ownership Proxy (accumulated ledger of ownership). Owner A g=123 Owner B Owner A g=123 Owner C Owner B Owner A g=123 IoT Platform Device Management Service (SDO Code) Office NOC d cloud Silicon Provider OEM/ODM Board/Device Distributor/ Reseller Online Retailer Control using credentials from Office NOC, identity Independent of SDO GUID 123 Replacement SDO credentials can be used for recovery or resale. Otherwise, SDO is dormant. Office Install Device shipped separately from Ownership Proxy COMPLETE 18

19 SDO: A Superior Out-of-Box Customer Experience Quality Time to Onboard Skill set / Segregation of Duties IT / OT tension Trust Privacy COTS devices / SKUs Secrets Automated, Scripted, Reproducible Boot + <1m, Multiple run in parallel Physical installer only and not required to be entrusted w/ keys Fast deployment, with High Security User Controlled, not Centralized, 3 rd -party controlled Established directly between IoT Device and Service With EPID, hard to trace onboarding to deployed operation Just-in-time provisioning of owner key(s) No secrets transmitted 19

20 Ecosystem Enablement 20

21 Intel SDO Enabling Concept & Components Silicon Providers EPID SDK Device EPID SDK TEE SDO Client Mgr Agent Initial Device Identification (EPID Attestation) 2 OEM Development Toolkit - board and gateways - integrate SDO client software into their boot code Secure Device Onboard Rendezvous, not authentication Service Take Ownership 4 ONBOARD ATTEST SDO Service Identification Device securely on-boarded under Normal Platform Control 3 1 IoT Platform Service Provider Platform Registration Service SDO API Platform Manager Service Supplier Ownership Proxy New Owner CSP/ISV Toolkit - integrate SDO API into their IoT Platform 21

22 1 to Many Pre-load Model & Automated Activation From 11 manual steps & 20 min activation per device Kaiser Research Validation Study Available To 1 enablement step & seconds to activate! ROI $ Customer - Simplifies field installation ODM - No need to preload & validate each IoT platform Installer - Eliminates security misconfigure from humans ODM - No need to ship hackable default passwords Min MAX Customer - Deploy more devices faster IoT Platform ISV - More devices under management 22

23 Use Case Ecosystem Enabling for Customers Sample Onboarding Ecosystem Customer & SI IoT Platform Management Providers OEMs/ODMs Devices Intel & MCUs Customer RFP Project - the - has customer s an IoT POC SI started 4. using RFP IoT Response - 2. ODMs Scale & Need -5. realizes Implementation that proprietery - ecosystem onboarding requiring methods determines Platform Provider 500 gateways, which will 2 IA serve devices, as data & devices mgt that have have pre-enabled high configuration enablement cost and download won t scale SDKs for from devices Intel they and back 2 end. MCU devices make up spectrum or agree to enable need using onboarded SDO so developer they choose zone the site. IoT Customers Platform s distribution Zero of devices for project. They specifify SDKs win larger orders Touch Onboard Capability-powered chain digitally signs by order Intel in transit & installer SDO enabled devices as requirement in powers on. Device phone homes to IoT project RFP they send to ecosystem. platform to onboard in seconds. 23

24 Secure Device Onboard + Device Management = Complete Security Channel from 1 st Boot Connected Device Intel Agent SDO Client Device Cloud Agent & OS Agent Secure Intel HW Root of Trust 1 Onboard Service Zero Touch Onboarding (anonymous identity + encrypted channel) Secure Update Device image and corporate key download 3 2 HDC or Device Management Service 4 Data Forwarding for analytics etc Customer s OT IoT Platform & Apps EPID SDK SEE THE DEMO IN BOOTH

25

26 DEVICE CLOUD OFFERS: Enhanced Device Management Capabilities: Remote monitoring, software over-the-air/firmware over-the-air updates, alerts, rules, update campaigns, data management and monitoring Flexible Deployment Options: Support for public, private and hybrid cloud deployments, as well as expanded regional public cloud hosting options Broad OS Support: Ease of connecting devices utilizing a new Python Agent that simplifies managing a large range of intelligent gateways and devices running different operating systems Expanded set of APIs to simplify contextualizing device data and device applications with business processes and business systems

27 IOT DEVICE LIFECYCLE MANAGEMENT Deploy Decommission Monitor Update Service Manage

28 CONNECT DEVICE TO CLOUD TO ENTERPRISE Device Agent On-cloud Management Platform Installed on IoT device OS Management console Commands device sensors RESTful API Built using RESTful API s Securely connects via wireless or cell Data forwarding to enterprise IT IT systems IoT Big apps data IoT Cloud Big appservices data Security solutions across device and network

29 ADDRESSING THE CHALLENGE OF ECONOMICALLY MANAGING A NETWORK OF DEPLOYED DEVICES Accelerate time to market to capture ROI from IoT investment Device Cloud Delivers Integration with Intel security services Reduce costs associated with securely managing network of fielded devices, at scale Minimize downtime and outages Security and privacy for enterprise and customer assets and data Manage increasing complexity resulting from the proliferation of intelligent edge devices Business and technology risks associated with device vendor lock-in Operating system agnostic solution Unified management interface Support for Private, Hybrid, and Public clouds Device provisioning, monitoring, servicing, and software updates Integration with enterprise applications 24x7 system monitoring IOT Design Center services for project delivery

30 SUMMARY Imperative: Secure & Scale the Internet of Things Security starts with immutable ID EPID is the Key to IoT Secure Device Onboard Any Device to Any Cloud Place, Power, Provision

31 Additional Resources Intel Secure Device Onboard Enanced Privacy ID Open Source EPID SDK: Internet of Things (IoT) Security Foundation Whitepaper Smashing the IoT Deployment Hurdle: Introducing Intel Secure Device Onboard Service

32 References Platform Embedded Security Technology Revealed, Chapter 5, Privacy at the next level, Intel s Enhanced Privacy Identification (ID) Technology, Apress Books (free download): (EPID 1.1) E. Brickell and Jiangtao Li: Enhanced Privacy ID from Bilinear Pairing for Hardware Authentication and Attestation. IEEE International Conference on Social Computing / IEEE International Converence on Privacy, Security, Risk and Trust Dr. Dobbs: Barreto-Naehrig (B-N) ECC Curve (ISO/IEC , 2009)

33

34 Legal Disclaimers Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps. Copyright 2017 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Inside, the Intel Inside logo, and Intel Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. 34

SSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions

SSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions SSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions THIS SLIDE MUST BE USED WITH ANY SLIDES REMOVED FROM THIS PRESENTATION Legal Disclaimers Intel technologies features

More information

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.

More information

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1

More information

Windows IoT Security. Jackie Chang Sr. Program Manager

Windows IoT Security. Jackie Chang Sr. Program Manager Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport

More information

New Approaches to Connected Device Security

New Approaches to Connected Device Security New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

Using the tpm with iot

Using the tpm with iot Using the tpm with iot David Grawrock Security Architect, Senior Principle Engineer Agenda History Lesson What Does IoT Need How Does The Fulfill Needs Usage IoT Security 2 History Worked on the from 1999

More information

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat

More information

A Peek at the Future Intel s Technology Roadmap. Jesse Treger Datacenter Strategic Planning October/November 2012

A Peek at the Future Intel s Technology Roadmap. Jesse Treger Datacenter Strategic Planning October/November 2012 A Peek at the Future Intel s Technology Roadmap Jesse Treger Datacenter Strategic Planning October/November 2012 Intel's Vision This decade we will create and extend computing technology to connect and

More information

SIEMLESS THREAT DETECTION FOR AWS

SIEMLESS THREAT DETECTION FOR AWS SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting

More information

Transforming Utility Grid Operations with the Internet of Things

Transforming Utility Grid Operations with the Internet of Things Solution Brief Internet of Things Energy Industry Transforming Utility Grid Operations with the Internet of Things Access key process data in real time to increase situational awareness of grid operations.

More information

Problem Solved. Now Is the Time for 10GbE

Problem Solved. Now Is the Time for 10GbE Problem Solved. Now Is the Time for 10GbE Solve the problem of increased network demands and the growing need to support virtualization with 10GbE Intel Ethernet. Table of Contents Data Growth Accelerates

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

Deliver Data Protection Services that Boost Revenues and Margins

Deliver Data Protection Services that Boost Revenues and Margins FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing

More information

Cybersecurity with Automated Certificate and Password Management for Surveillance

Cybersecurity with Automated Certificate and Password Management for Surveillance Cybersecurity with Automated Certificate and Password Management for Surveillance October 2017 ABSTRACT This reference architecture guide describes the reference architecture of a validated solution to

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

Fast-track Hybrid IT Transformation with Intel Data Center Blocks for Cloud

Fast-track Hybrid IT Transformation with Intel Data Center Blocks for Cloud Fast-track Hybrid IT Transformation with Intel Data Center Blocks for Cloud Kyle Corrigan, Cloud Product Line Manager, Intel Server Products Group Wagner Diaz, Product Marketing Engineer, Intel Data Center

More information

Building Trust in the Internet of Things

Building Trust in the Internet of Things AN INTEL COMPANY Building Trust in the Internet of Things Developing an End-to-End Security Strategy for IoT Applications WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Recent security breaches

More information

MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP

MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP APR 2018 MARC GEBERT EMEA IOT SECURITY BD LEAD SENIOR DIRECTOR Secure Connections for the Smarter World Everything Smart Everything

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

Modernizing Servers and Software

Modernizing Servers and Software SMB PLANNING GUIDE Modernizing Servers and Software Increase Performance with Intel Xeon Processor E3 v3 Family Servers and Windows Server* 2012 R2 Software Why You Should Read This Document This planning

More information

#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication

More information

2013 Cisco and/or its affiliates. All rights reserved. 1

2013 Cisco and/or its affiliates. All rights reserved. 1 2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System

More information

Mohan J. Kumar Intel Fellow Intel Corporation

Mohan J. Kumar Intel Fellow Intel Corporation OCP Initiatives and Intel Implementations Mohan J. Kumar Intel Fellow Intel Corporation Agenda Open Firmware Firmware at Scale Platform Attestation Summary Open Firmware UEFI-based Open Firmware (for Intel-based

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage

More information

Securing Devices in the Internet of Things

Securing Devices in the Internet of Things AN INTEL COMPANY Securing Devices in the Internet of Things WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information

Driving network transformation DAN RODRIGUEZ VICE PRESIDENT DATA CENTER GROUP GENERAL MANAGER COMMUNICATIONS INFRASTRUCTURE DIVISION

Driving network transformation DAN RODRIGUEZ VICE PRESIDENT DATA CENTER GROUP GENERAL MANAGER COMMUNICATIONS INFRASTRUCTURE DIVISION Driving network transformation DAN RODRIGUEZ VICE PRESIDENT DATA CENTER GROUP GENERAL MANAGER COMMUNICATIONS INFRASTRUCTURE DIVISION Transforming the network Data is exploding requires higher capacity

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

An introduction to today s Modular Operating System

An introduction to today s Modular Operating System An introduction to today s Modular Operating System Bun K. Tan Open Source Technology Center - Intel Corporation October 2018 *Other names and brands may be claimed as the property of others Agenda Why

More information

The Evolution of Data Center Security, Risk and Compliance

The Evolution of Data Center Security, Risk and Compliance #SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and

More information

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust Solution Brief: Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust DeviceTone, our ready to run "connect, manage and enable" solution for product companies, makes secure connectivity,

More information

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological

More information

NFV Platform Service Assurance Intel Infrastructure Management Technologies

NFV Platform Service Assurance Intel Infrastructure Management Technologies NFV Platform Service Assurance Intel Infrastructure Management Technologies Meeting the service assurance challenge to nfv (Part 1) Virtualizing and Automating the Network NFV Changes the Game for Service

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

Patching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE

Patching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE Patching and Updating your VM SUSE Manager Donald Vosburg, Sales Engineer, SUSE dvosburg@suse.com Why should I care? I just clone my base VM image, and after that it is not my problem... Understand the

More information

Trustzone Security IP for IoT

Trustzone Security IP for IoT Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday

More information

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity

More information

How to Create, Deploy, & Operate Secure IoT Applications

How to Create, Deploy, & Operate Secure IoT Applications How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections

More information

IoT Market: Three Classes of Devices

IoT Market: Three Classes of Devices IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat

More information

Securing IoT with the ARM mbed ecosystem

Securing IoT with the ARM mbed ecosystem Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into

More information

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1 Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Intel s Architecture for NFV

Intel s Architecture for NFV Intel s Architecture for NFV Evolution from specialized technology to mainstream programming Net Futures 2015 Network applications Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

Evolution For Enterprises In A Cloud World

Evolution For Enterprises In A Cloud World Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing

More information

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems

More information

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications:

More information

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com

More information

Redesigning PKI To Solve Revocation, Expiration, & Rotation Problems. Brian

Redesigning PKI To Solve Revocation, Expiration, & Rotation Problems. Brian Redesigning PKI To Solve Revocation, Expiration, & Rotation Problems Brian Knopf @DoYouQA WHO AM I Sr Director of Security Research & IoT Architect @Neustar @DoYouQA 20+ Home Previously years in IT, QA,

More information

How to protect Automotive systems with ARM Security Architecture

How to protect Automotive systems with ARM Security Architecture How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

Intel. Rack Scale Design: A Deeper Perspective on Software Manageability for the Open Compute Project Community. Mohan J. Kumar Intel Fellow

Intel. Rack Scale Design: A Deeper Perspective on Software Manageability for the Open Compute Project Community. Mohan J. Kumar Intel Fellow Intel Rack Scale Design: A Deeper Perspective on Software Manageability for the Open Compute Project Community Mohan J. Kumar Intel Fellow Agenda Rack Scale Design (RSD) Overview Manageability for RSD

More information

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation 2017 Executive Summary (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation www.blockchainofthings.com Abstract The Internet of Things (IoT) is not secure and we

More information

Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop

Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland

More information

Munara Tolubaeva Technical Consulting Engineer. 3D XPoint is a trademark of Intel Corporation in the U.S. and/or other countries.

Munara Tolubaeva Technical Consulting Engineer. 3D XPoint is a trademark of Intel Corporation in the U.S. and/or other countries. Munara Tolubaeva Technical Consulting Engineer 3D XPoint is a trademark of Intel Corporation in the U.S. and/or other countries. notices and disclaimers Intel technologies features and benefits depend

More information

EBV Personalization Services for Security Devices

EBV Personalization Services for Security Devices Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO

TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO TABLE OF CONTENTS Executive Summary... 3 FIDO Solution Requirements... 3 FIDO UAF Client infrastructure... 4 FIDO UAF

More information

Välkommen. Intel Anders Huge

Välkommen. Intel Anders Huge Välkommen Intel Anders Huge Transformative Technology from Intel A n d e r s H u g e I n t e l Why intel INTEL CORPORATION 5 TRANSFORMING BUSINESS MODERN BUSINESS DEMANDS Intel VISION Accelerate workplace

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

RE-IMAGINING THE DATACENTER. Lynn Comp Director of Datacenter Solutions and Technologies

RE-IMAGINING THE DATACENTER. Lynn Comp Director of Datacenter Solutions and Technologies RE-IMAGINING THE DATACENTER Lynn Comp Director of Datacenter Solutions and Technologies IT: Period of Transformation Computer-Centric Network-Centric Human-Centric Focused on Productivity through automation

More information

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes How SD-WAN will Transform the Network And lead to innovative, profitable business outcomes By 2020, more than 50 percent of WAN edge infrastructure refresh initiatives will be based on SD-WAN versus traditional

More information

Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge

Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge Key Threats Internet was just growing Mail was on the verge Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering Key Threats Code Red and Nimda (2001), Blaster (2003), Slammer

More information

CLOUD WORKLOAD SECURITY

CLOUD WORKLOAD SECURITY SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly

More information

2008 Intel Core 2 Processor with vpro Technology Launch Keynote

2008 Intel Core 2 Processor with vpro Technology Launch Keynote 2008 Intel Core 2 Processor with vpro Technology Launch Keynote Gregory Bryant Vice President Digital Office Platform Division September 22, 2008 Legal and Trademark Disclaimers 1. Performance based upon

More information

ARM mbed mbed OS mbed Cloud

ARM mbed mbed OS mbed Cloud ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics

More information

Out-of-band (OOB) Management of Storage Software through Baseboard Management Controller Piotr Wysocki, Kapil Karkra Intel

Out-of-band (OOB) Management of Storage Software through Baseboard Management Controller Piotr Wysocki, Kapil Karkra Intel Out-of-band (OOB) Management of Storage Software through Baseboard Management Controller Piotr Wysocki, Kapil Karkra Intel 2018 Storage Developer Conference. Intel Corporation. All Rights Reserved. 1 Notices

More information

Oktober 2018 Dell Tech. Forum München

Oktober 2018 Dell Tech. Forum München Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven

More information

Modernizing Meetings: Delivering Intel Unite App Authentication with RFID

Modernizing Meetings: Delivering Intel Unite App Authentication with RFID Modernizing Meetings: Delivering Intel Unite App Authentication with RFID INTEL UNITE SOLUTION WHITE PAPER Revision 1.0 Document Number: 599309-1.0 Legal Disclaimers and Copyrights All information provided

More information

Security & Compliance in the AWS Cloud. Amazon Web Services

Security & Compliance in the AWS Cloud. Amazon Web Services Security & Compliance in the AWS Cloud Amazon Web Services Our Culture Simple Security Controls Job Zero AWS Pace of Innovation AWS has been continually expanding its services to support virtually any

More information

WEB-APIs DRIVING DIGITAL INNOVATION

WEB-APIs DRIVING DIGITAL INNOVATION WEB-APIs DRIVING DIGITAL INNOVATION Importance of Web-APIs Simply put, Web-APIs are the medium to make a company s digital assets consumable to any channel, which has a current or latent need. It helps

More information

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Business Challenges Investment in the Industrial Internet of Things (IIoT) is expected to top $60 trillion during the next 15 years.

More information

Open Security Controller - Security Orchestration for OpenStack

Open Security Controller - Security Orchestration for OpenStack SESSION ID: CSV-W02 Open Security Controller - Security Orchestration for OpenStack Tarun Viswanathan Platform Solution Architect Intel Manish Dave Platform Architect Intel Notices and Disclaimers Intel

More information

Intel Network Builders Solution Brief. Etisalat* and Intel Virtualizing the Internet. Flexibility

Intel Network Builders Solution Brief. Etisalat* and Intel Virtualizing the Internet. Flexibility Intel Network Builders Solution Brief Etisalat* and Intel Virtualizing the Internet Gateway Gi-LAN for Service Flexibility Introduction Etisalat Group* is one of the world s leading telecom groups in emerging

More information

Enterprise Cloud Computing. Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur

Enterprise Cloud Computing. Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur 1 Enterprise Cloud Computing Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur Agenda 2 Fundamentals of Enterprise Cloud Computing IT & Cloud Computing Requirements

More information

Twilio cloud communications SECURITY

Twilio cloud communications SECURITY WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and

More information

HPE ProLiant ML350 Gen P 16GB-R E208i-a 8SFF 1x800W RPS Solution Server (P04674-S01)

HPE ProLiant ML350 Gen P 16GB-R E208i-a 8SFF 1x800W RPS Solution Server (P04674-S01) Digital data sheet HPE ProLiant ML350 Gen10 4110 1P 16GB-R E208i-a 8SFF 1x800W RPS Solution Server (P04674-S01) ProLiant ML Servers What's new Support for Intel Xeon Scalable processors full stack. 2600

More information

Juniper Sky Enterprise

Juniper Sky Enterprise Juniper Sky Enterprise Product Overview Network complexity is growing exponentially. Traffic levels continue to rise thanks to the proliferation of mobile and Internet of Things (IoT) devices being connected

More information

#techsummitch

#techsummitch www.thomasmaurer.ch #techsummitch Justin Incarnato Justin Incarnato Microsoft Principal PM - Azure Stack Hyper-scale Hybrid Power of Azure in your datacenter Azure Stack Enterprise-proven On-premises

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

powered by Cloudian and Veritas

powered by Cloudian and Veritas Lenovo Storage DX8200C powered by Cloudian and Veritas On-site data protection for Amazon S3-compliant cloud storage. assistance from Lenovo s world-class support organization, which is rated #1 for overall

More information

HPE ProLiant ML350 Gen10 Server

HPE ProLiant ML350 Gen10 Server Digital data sheet HPE ProLiant ML350 Gen10 Server ProLiant ML Servers What's new Support for Intel Xeon Scalable processors full stack. 2600 MT/s HPE DDR4 SmartMemory RDIMM/LRDIMM offering 8, 16, 32,

More information

Rethinking IoT Authentication & Authorization Models

Rethinking IoT Authentication & Authorization Models Rethinking IoT Authentication & Authorization Models 2017 ISSA SoCal Security Symposium September 14, 2017 Hilton Orange County, Costa Mesa Brian Knopf @DoYouQA WHO AM I Sr Director of Security Research

More information

TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE

TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE SESSION ID: TECH-F03 TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE Tom Dodson Supply Chain Security Architect Intel Corporation/Business Client Products Monty Wiseman Security

More information

Securing Your Cloud Introduction Presentation

Securing Your Cloud Introduction Presentation Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today

More information

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014 Enabling Fast IT In the IoE era Alberto Degradi DCV Sales Leader November 2014 Agenda IT Challenges Today EMC + Cisco + Intel Cisco Unified Data Center Joint Data Center Solutions Cisco Confidential 2

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

Lenovo ThinkCentre M90z with Intel vpro Technology. Stefan Richards Intel Corporation Business Client Platform Division

Lenovo ThinkCentre M90z with Intel vpro Technology. Stefan Richards Intel Corporation Business Client Platform Division Lenovo ThinkCentre M90z with Intel vpro Technology Stefan Richards Intel Corporation Business Client Platform Division stefan.n.richards@intel.com 1 Legal Information 1. INFORMATION IN THIS DOCUMENT IS

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Cloud-Enable Your District s Network For Digital Learning

Cloud-Enable Your District s Network For Digital Learning Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission

More information

BUILDING the VIRtUAL enterprise

BUILDING the VIRtUAL enterprise BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,

More information

The Information Company for Storage Professionals

The Information Company for Storage Professionals CLOUD COMPUTING Slide 2 Provider s Idea of Cloud Storage App Code I.T. Slide 3 Consumer s Idea of Cloud Storage Automated IT Flexible Business Low Cost of Operations Reduced Risk Data is always available

More information

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5

More information