Select Page
Enclave Device Blueprint Architecture

The Enclave Device Blueprint for confidential computing at the edge

A major milestone towards making confidential computing in IoT mainstream for privacy and safety. In collaboration with Arm® Technologies and Scalys BV, we are announcing the immediate availability of the Enclave Device Blueprint to help towards making confidential computing a ... continue reading
Edge Compute Node protection profile.

Solving IoT device security at scale through standards

Edge Compute Node protection profile (ECN PP)—now available—guides you to engineer, claim, evaluate, and consume device security for IoT. Internet of Things (IoT) solution builders these days are more likely to deploy IoT solutions with unsecured devices because they cannot ... continue reading