A Hardware Root of Trust is a minimum set of hardware and software that is trusted to provide security functions such as key management, device identity authentication and run-time monitoring of the system. In recent years, Hardware Roots of Trust have been gaining wide usage for maintaining the integrity of the IoT edge and securing compute and storage workloads in the datacenter. Compromises in Hardware Roots of Trust can affect the integrity of all devices and leak highly sensitive information to unauthorized parties.
As one of the most advanced pre-silicon security solutions on the market, Radix-S scans both a system’s hardware and software during the pre-silicon design and verification stages to detect and prevent any system-level security vulnerabilities.
Radix-S helps prevent against:
- Unprivileged access to customer proprietary or confidential data
- Unauthorized access to keys used to sign and authenticate boot images
- Side channel leakages of critical customer information
- System-level compromises arising from Hardware Root of Trust misconfigurations
- Undetected system architecture security gaps
Deployment of Radix-S does not require additional resources or modifications to existing engineering infrastructure or methodology. Radix-S ships with Hardware Root of Trust security threat models that span both hardware and software, providing a complete and extensible solution for detecting security vulnerabilities.
Radix-S is available now.