Hex Five Adds MultiZone Security Isolation with Micron's Authenta Flash
Enabling secure execution of multiple subsystems from storage to application processor.
REDWOOD SHORES, Calif., October 28, 2019 — Hex Five Security Inc. today announced the availability of MultiZone™ Security Trusted Execution Environment for Micron’s Authenta™-enabled flash technology.
Hex Five’s open standard technology provides software-defined hardware-enforced separation for multiple application domains, with full isolation of data, programs and peripherals. Contrary to traditional solutions, MultiZone™ Security requires no hypervisor software or hardware support for virtualization: open source libraries, third party binaries, and legacy code can be configured in minutes to achieve unprecedented levels of safety and security.
Authenta-enabled flash, with its integrated secure element function, can perform code and data integrity checks and cryptographic locking of memory regions. MultiZone™ Security firmware relies on this strong layer of trust and protection for secure boot and separation policies.
“Authenta- enabled flash brings forth a quick and safe way to integrate MultiZone™ Security into IoT and Automotive platforms where connectivity and consolidation requirements inexorably lead to an increased attack surface,” said Cesare Garlati, Founder of Hex Five Security, Inc.
“MultiZone Security isolates multiple workloads on the same application processors, complementing Micron Authenta flash technology’s ability to protect and harden firmware,” said Jeff Shiner, director for IoT Security Solutions for Micron’s Embedded Business Unit. “Together, they provide a strong foundation for embedded multitenant systems and delivery of edge device mobility services while tackling untrusted supply chain risks.”
MultiZone™ Security enabled by Authenta™ will be demonstrated to the general public at the Micron Authenta Workshop on November 5th, 2019 in San Jose, California – free registration at http://go.micron.com/TS-2019-11-04-Security-Summit_LP.html
About Hex Five Security, Inc.
Hex Five’s open standard technology provides software-defined hardware-enforced isolation for multiple application domains, with full control over data, programs, and peripherals. Contrary to traditional solutions, MultiZone™ Security requires no hypervisor software or hardware support for virtualization. Open source libraries, third party binaries and legacy code can be configured in minutes to achieve unprecedented levels of safety and security. For more information visit http://www.hex-five.com
|
Related News
- Hex Five Adds MultiZone Security to the AdaCore Software Ecosystem
- Hex Five adds MultiZone Security to the Andes RISC-V Cores on GOWIN FPGAs
- Hex Five Security Adds MultiZone Trusted Execution Environment to the SiFive Software Ecosystem
- Hex Five Announces MultiZone Security for Arm Cortex-M Series Processors
- Hex Five Announces General Availability of MultiZone Security for Linux - The First Commercial Enclave for RISC-V processors
Breaking News
- Logic Design Solutions launches Gen4 NVMe host IP
- ULYSS1, Microcontroller (MCU) for Automotive market, designed by Cortus is available
- M31 is partnering with Taiwan Cooperative Bank to launch an Employee Stock Ownership Trust to strengthen talent retention
- Sondrel announces CEO transition to lead next phase of growth
- JEDEC Publishes LPDDR5 CAMM2 Connector Performance Standard
Most Popular
- Arm's power play will backfire
- Alphawave Semi Selected for AI Innovation Research Grant from UK Government's Advanced Research + Invention Agency
- Secure-IC obtains the first worldwide CAVP Certification of Post-Quantum Cryptography algorithms, tested by SERMA Safety & Security
- Weebit Nano continuing to make progress with potential customers and qualifying its technology Moving closer to finalisation of licensing agreements Q1 FY25 Quarterly Activities Report
- PUFsecurity Collaborate with Arm on PSA Certified RoT Component Level 3 Certification for its Crypto Coprocessor to Provide Robust Security Subsystem Essential for the AIoT era
E-mail This Article | Printer-Friendly Page |