In collaboration with Arm® Technologies and Scalys BV, we are announcing immediate availability of the Enclave Device Blueprint to help towards making confidential computing a mainstream computing paradigm at the edge.
Showing 1 – 8 of 8 posts found
A seamless and comprehensive approach to securely onboard and operate IoT devices using certificate-based credentials.
Edge Compute Node protection profile (ECN PP)—now available—guides you to engineer, claim, evaluate, and consume device security for IoT.
Today we are excited to announce the cross-platform availability of the Open Enclave SDK for devices at the intelligent edge, as well as the preview of integration of Open Enclave and the Azure IoT Edge security manager.
Azure IoT Edge which recently became generally available, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors.
How do you go about answering those perplexing questions such as what secure hardware to use? How do I gauge the level of security? How much security do I really need and hence how much premium should I place on secure hardware? We’ve published a new whitepaper to shed light on this subject matter.
The Intelligent Edge demands a high bar for security to thrive. Microsoft allies with partners to meet this bar for Azure IoT Edge.
Secured and lifecycle-managed device identity should just be another component of the IoT developers standard toolbox. Microsoft in collaboration with secure silicon partners is making this a reality.