Security for the Next One Trillion Devices
Arm-based chips are already in more than 100 billion devices, and as the Internet of Things (IoT) rapidly expands, we expect that number to grow to a global network of one trillion connected devices. Security cannot be an afterthought. It must considered at inception, and each threat addressed with the appropriate countermeasure. Arm has been helping the ecosystem secure devices from chip to cloud for many years, and remains committed to an end-to-end approach to security.
More than 1,600 software, tools and service partners to support and enable the use of our technology.
The Arm Platform Security Architecture (PSA) is the framework for a common security best practice.
Our IP extends across the system with protection for processors, subsystems, acceleration, and offloading—all fitting together seamlessly for layered protection.
Arm continues to build on its history in mobile security, addressing new market requirements for developer-friendly, deterministic, real-time embedded and IoT applications.
The PSA Certified 2021 Security Report is a comprehensive study into the opinions of 600+ IoT technology decision-makers, examining the glaring gap between the perceptions of security today and the reality – where companies are skipping threat modeling, lacking resources and struggling with fragmentation. Read the report to understand more and learn how collaboration will bridge this gap.
Global Reach, Global Ecosystem
Arm is at the epicenter of the world’s largest compute ecosystem. We are uniquely positioned to take a system-wide approach to security, applying the insights gained from over 100 billion Arm-based chips, and working with our partners to generate more trusted intelligent-learning capabilities on more devices at the edge. Our Platform Security Architecture (PSA), rallies the industry to adopt a common framework, shifting the economics of designing-in scalable security for connected devices.
Easy Access to Built-In Security
The true value of connecting a trillion devices lies in the seamless flow of trusted data between devices and from device to cloud. Security must remain invisible, yet always present, and never interfere with legitimate data flow. By embedding security in our architecture, designs, frameworks and products, and promoting industry standards through the PSA, we’re reducing friction and time-to-security across the design and development cycle.
Architects of a Secure Connected World
Arm has a strong history in security originating from our heritage of providing secure compute platforms for the mobile revolution. Arm technology has been used to secure smartcards, SIMs and other secure elements through to feature-rich secured devices in mobile handsets, tablet computers, DTVs, set top boxes and enterprise systems. We continue to build on that history, applying our expertise to new market requirements, including developer-friendly, deterministic, real-time embedded and IoT applications.
Solutions Ensuring Security from Chip to Cloud
As security attacks and threats continue to evolve, so must the methods to combat them. Arm provides an expanding portfolio of secure IP, firmware, and software, and collaborates with the ecosystem to provide the right countermeasures for the variety of threats now facing devices. Solutions include Arm TrustZone technology for Cortex-A and Cortex M processors, plus a range of Arm TrustZone-enabled CPUs. To complement this, a wide suite of security IP includes a new set of products designed to protect against physical attacks and Arm Mbed OS, an open source IoT operating system, delivers security throughout the device lifecycle.
As long as there is value in controlling a device or accessing its data, there will be a constant battle against potential attackers. Talk with an Arm expert to learn more about security technologies that can be designed into devices.
We asked 1,200 tech sector workers
what they thought about security
Sixty-seven percent (67%) thought most technology companies
did not regard security as fundamental. Arm believes this is a problem.
Protect Your Data Platforms from the Next Wave of Cybercrime
The latest Arm Security Manifesto 2018 shows a disturbing trend in the continuing rise of cybercrime, particularly vast armies of attack bots and elaborate global security offensives. Yet industry is under pressure to simplify IoT, even as the numbers of IoT devices and data streams multiply by billions every year.