Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

IAR Systems Strengthens Security Development Workflow With Simplified Enhanced IP Protection and Production Control

Latest version of C-Trust adds ready-made Security Context Profiles for production control and support for new mainstream devices as well as Arm TrustZone devices

IAR Systems, the future-proof supplier of software tools and services for embedded development, announces version 1.40 of the security development tool C-Trust, further simplifying the implementation of security features into the development workflow. New device support includes mainstream devices as well as Arm® TrustZone® for Arm Cortex®-M devices from STMicroelectronics and NXP.

As embedded applications require additional security and companies try to meet the ongoing changes in IoT device legislations, there is a growing need to both protect the Intellectual Property (IP) and to ensure that product integrity is not compromised by counterfeiting and cloning during production. C-Trust works as an extension to the development toolchain IAR Embedded Workbench® and enables developers to easily build security into their applications, without having to master the deeper complexities of security, through the use of innovative Security Context Profiles. A Security Context Profile defines the configuration of the trusted execution environment by describing the security environment that is required to protect an application. The properties of the Security Context Profile include cryptographic keys and certificates, Secure Boot configuration, device security, application update process and policy, and device memory layout. In addition to ready-made Security Context Profiles for IP protection, version 1.40 of C-Trust adds Security Context Profiles for production control. This new feature empowers developers to pre-define how many end products can be provisioned during production, preventing damaging cloning and counterfeiting.

Recommended AI News: Top 10 Countries and Cities by Number of CCTV Cameras

Related Posts
1 of 40,848

“Our customers are telling us they are ready to start their transition into developing with security,” says Stefan Skarin, CEO and President, IAR Systems. “Security is their top priority, but there is also a frustration over the complexity of trying to implement security features. By providing integrated, simplified security development workflows with extended device support, we enable them to get started immediately, and reach a level of security that is sufficient as a starting point.”

C-Trust delivers ground-breaking security across the supply chain when coupled with the new Secure Desktop Provisioner by Secure Thingz, also announced today. Additionally, in the fast changing IoT market, there is a wide array of emerging security technologies in semiconductor devices. These technologies range from physical protection mechanisms in next generation devices, through to hardware memory enforcement techniques, plus the ability to design and deploy devices with keys and other secrets securely provisioned.

Recommended AI News: The Surprising Lesson A Blue Cow And AI Can Teach Us About Being Successful In E-Commerce

“Implementing security in advanced embedded devices is critical in meeting upcoming legislative requirements”, said Haydn Povey, CEO Secure Thingz. “The newly supported Arm TrustZone devices, coupled with our security tools, enable developers to rapidly deliver advanced applications with security from inception, providing the robustness and availability end users demand, and providing a secure foundation for the future of IoT.”

Recommended AI News: AWS Acquires a Powerful Data Exploration and Visualization to Boost Python & R Integration

Comments are closed, but trackbacks and pingbacks are open.