SECURE-BY-DESIGN EDGE COMPUTING SOLUTION

Security from the core to the edge with a hardware root of trust

Slide 3

CYSEC SECURES THE SMART HEATERS OF LANCEY ENERGY STORAGE

Slide 3

IoT MONITORING SOLUTION FOR ENHANCED PUBLIC SAFETY

Slide 3

ALL-INCLUSIVE CYBERSECURITY SOLUTION TO RAPIDLY SECURE BACKEND INFRASTRUCTURE

Slide 3

PROTECTING HEALTH DATA ON PUBLIC CLOUD WITH HOSTEUR & CYSEC

Slide 3

SECURE ON-PREMISE LoRaWAN NETWORK DEPLOYMENT

Edge computing is developing rapidly, driven by next-generation connected devices and fast communication links. Gartner predicts that by 2025, 75% of enterprise-generated data will be created and processed at the edge. As value shifts toward the edge, security gaps emerge in cloud-edge integration and edge devices become an entry point for attack.

Vulnerabilities exist at each building block of the edge ecosystem— the edge, the public cloud, and the endpoint. CYSEC ARCA is the first comprehensive trusted execution environment that secures data throughout the entire edge ecosystem.

OUR SOLUTIONS

Benefits ARCA Trusted OS

Arca graphics

CYSEC ARCA gives you a full security solution, covering the edge and the back-end. It provides confidentiality and integrity of data collected at the edge, trust in application logic, and ensures attackers can’t use the edge to access your network.

ARCA is a trusted OS, designed to protect specific nodes up to end-to-end edge computing distributed architectures deployed from the core, the cloud and up to the edge. It benefits particularly companies looking to protect sensitive data and mission critical applications.

Interoperable

With the entire edge ecosystem, including public cloud services

Confidential computing environment

Safely collaborate using your sensitive data in untrusted environments

A certified hardware crypto engine

For straightforward key management & encryption service

Kubernetes for critical workloads

With container security for maximal protection from software-down attacks

Hardware-based

Provides maximal protection from hardware-up attacks

COMPREHENSIVE

Encompasses both the edge and the backend

Why is Edge IoT Vulnerable to Cyber-Attacks?

Edge devices rely on connectivity to transmit data collected by sensors. This data is high-value and transmitted to the cloud to deliver business intelligence and machine learning (ML). This connectivity opens a door to cyber criminals looking to take control of the device, move laterally in the network, eavesdrop on the high-value data, and disturb or interrupt critical services.

As a result, devices need to rely on a root of trust (RoT) for the secrets used in cryptographic operations behind data encryption or the authentication of other devices needed to communicate with the backend.

Further, edge devices need to be able to run critical software applications, perform firmware updates or data processing, in a confidential manner, making sure that an attacker cannot find a vulnerability to manipulate the code or data as it’s being processed.

Existing protection mechanisms compatible with embedded applications do not provide any protection for the data or code in use, nor are compatible with containerized software applications.

Industries

MANUFACTURING /INDUSTRY 4.0

ENERGY & UTILITY

TRANSPORT & LOGISTICS

HEALTHCARE

SMART INFRASTRUCTURE