We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest! Update Here
Stay in the loop with the latest from Microchip! Update your profile while you are at it. Update Here
Complete your profile to access more resources.Update Here!
0
$0.00
Item Qty
Your cart is empty.

Address IoT Security Requirements from Product Design to Deployment

Secure updates, failure recovery, software provisioning, IP protection and cloud integration in a turnkey solution.


With more than 60 billion devices expected to be online in less than five years, security at the device level is simply not optional any longer. IoT device developers need to ensure their products are protected from attacks, are safe and secure through the manufacturing process and are able to be managed securely throughout the life of the product. Without the appropriate implementation of IoT security, vendors risk damage to their products, credibility and brand, as well as the loss of critical intellectual property (like artificial intelligence and machine learning algorithms).   

Implementing security at the device level is, however, a big challenge. It requires investments in technical skills (security features, silicon integration and cloud integration) and changes to business processes (such as manufacturing operations), while still preserving budgets and optimizing time-to-market. To address this, developers should consider the entire lifecycle of a product. 

Consider a Holistic Approach to Device Security 

Secure device design should be considered with all phases of a product’s lifecycle in mind: 

     • Design:  Ensuring a complete secure boot process, memory partitioning for security functions like cryptography, storage and key/certificate management 

     • Build:  Secure software provisioning during manufacturing, protection of critical IP (such as AI/ML algorithms) 

     • Sustain: Secure Over-the-Air (OTA) updates, quick recovery in the event of a failure, integration with cloud platforms and monitoring of threats 

EmSPARK™ Security Suite – a Turnkey Software Approach 

To help alleviate such security challenges, Microchip’s design partner Sequitur Labs developed the EmSPARK™ Security Suite. It’s a comprehensive IoT security software solution that addresses the key security elements of the IoT device lifecycle (design, build and sustain) in a pre-packaged solution. As an IoT device developer, you can significantly reduce the risk and time-to-market challenges of implementing device security by easily integrating EmSPARK within your device applications.   

EmSPARK for Microchip’s SAMA5D2 and SAMA5D2 SOM Devices 

Sequitur Labs has collaborated with Microchip in order to enable the complete feature set supported by the SAMA5D2 and SAMA5D2-SOM devices. Using ARM TrustZone technology enabled by the SAMA5D2, the EmSPARK Security Suite provides the process for memory partitioning, a secure operating system, applications for crypto, key management and storage, as well as a set of robust APIs for easy integration with your product’s firmware. Functions supported include secure boot, OTA updates, failure recovery, software provisioning, IP protection, integration with Amazon Web Services, Microsoft Azure and deep device metrics for threat monitoring. 

How to Get Started 

Just download the free EmSPARK evaluation kit from the Sequitur Labs website. Or if you’re looking for a pre-packed evaluation kit, start with the Shield96 Trusted Board, a flexible development platform that’s pre-loaded with the EmSPARK Security Suite software. 

Still have more questions? Contact the Sequitur team at info@sequiturlabs.com

Sequitur Labs, Jan 28, 2021
Tags/Keywords: Industrial and IoT, Security