Secure-by-design Edge computing

Security at the edge with a hardware root of trust

ARCA Edge is a trusted OS, designed for a combined architecture of embedded and cloud systems, built to deliver end-to-end protection for edge computing.

Edge computing in IoT is developing rapidly, driven by next-generation connected devices and fast communication links. Gartner predicts that by 2025, 75% of enterprise-generated data will be created and processed at the edge. As value shifts toward the edge, security gaps emerge in cloud-edge integration and edge devices become an entry point for attack.

Vulnerabilities exist at each building block of the edge ecosystem— the edge, the public cloud, and the endpoint. CYSEC ARCA Edge is the first comprehensive trusted execution environment that secures data throughout the entire edge ecosystem.

CYSEC ARCA Edge gives you a full security solution, covering the edge and the back-end. It provides confidentiality and integrity of data collected at the edge, trust in application logic, and ensures attackers can’t use the edge to access your network.

Benefits

Interoperable

With the entire edge ecosystem, including public cloud services

Confidential computing environment

Safely collaborate using your sensitive data in untrusted environments

A certified hardware crypto engine

For straightforward key management & encryption service

Kubernetes for critical workloads

With container security for maximal protection from software-down attacks

Hardware-based

Provides maximal protection from hardware-up attacks

COMPREHENSIVE

Encompasses both the edge and the backend

Why is Edge IoT Vulnerable to Cyber-Attacks?

Edge devices rely on connectivity to transmit data collected by sensors. This data is high-value and transmitted to the cloud to deliver business intelligence and machine learning (ML). This connectivity opens a door to cyber criminals looking to take control of the device, move laterally in the network, eavesdrop on the high-value data, and disturb or interrupt critical services.

As a result, devices need to rely on a root of trust (RoT) for the secrets used in cryptographic operations behind data encryption or the authentication of other devices needed to communicate with the backend.

Further, edge devices need to be able to run critical software applications, perform firmware updates or data processing, in a confidential manner, making sure that an attacker cannot find a vulnerability to manipulate the code or data as it’s being processed.

Existing protection mechanisms compatible with embedded applications do not provide any protection for the data or code in use, nor are compatible with containerized software applications.

Use Cases for the Edge

The Things Industries – Secure On-Premise LoRaWAN Network Deployment.