IoT Security
With growing number of devices at the edge, security is becoming a priority. Intel offers foundational security capabilities to help protect the edge with hardware-based security features that are designed into the products to help customers build a trusted foundation for their edge devices1.
Intel's Foundational Security Capabilities for IoT Applications
Intel helps customers deliver high impact solutions with security in mind. Intel invests in four foundational IoT security categories:
- Platform integrity
- Improved protection for data, keys and ID
- Crypto acceleration
- Trusted execution
These foundational security capabilities are offered across all IoT products for customers to build security into their edge devices. To be equipped for a high security model, devices should be instrumented to take advantage of the foundational security capabilities.
Platform Integrity
Intel’s platform integrity mitigates against platform tampering by leveraging hardware root of trust-based protection of platform critical firmware, code and data.
Key Feature: Intel® Boot Guard
Improved Protection for Data, Keys and ID
Intel provides integrated as well as discrete options for tamper-resistant data, keys and credential protection.
Key Feature: Intel® Platform Trust Technology (Intel® PTT)
Integrated Crypto Hardware
Intel provides hardware accelerated cryptography and secure key generation for improved efficiency and overall compute performance of the platform.
Key Feature: Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)
Trusted Execution
Establish a hardware-based protection for application or workload execution environment with shared resources.
Key Feature: Intel® Virtualization Technology (Intel® VT)
Intel® Trusted Edge Platform
With Intel® Trusted Edge Platform, developers are not required to become experts in foundational security available on Intel processors. Intel Trusted Edge Platform offers software abstraction through APIs and microservices, while using best of the available security features on the platform. Key values include – creating trusted and isolated execution environment at the edge, enabling remote attestation, protecting data at rest with disk encryption. Available to customers under NDA and distributed with Intel® Distribution of Intel OpenVINO™ Security Add-on (OVSA) and Intel® Edge Controls for Industrial (ECI).
Additional information:
- Blog post: Taking Edge Security in Hand
- Submit questions or request a personal product education session
Downloads available to customers under NDA:
- Request evaluation access
- Contact Intel Sales to request access to special packages:
- Included in Intel® Edge Controls for Industrial package
- In Intel® OpenVINO Toolkit “Security add-on” package
IoT Security Resources
Security Center
For more information on Intel’s Security First Pledge and latest advisories, visit the Security Center.
IoT Security Documentation
Get design documents related to IoT security technologies.
Intel IoT Platforms
Foundational security capabilities are available to activate on all IoT platforms. Deploy edge applications quickly with Intel’s portfolio of edge-ready compute and connectivity technologies.
IoT Technologies
Browse related technologies which allow you to capture more data, analyze it faster, and act on it sooner.
Product and Performance Information
Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://www.intel.ca.