Supplier eBooks

NXP - 7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge

Issue link: https://resources.mouser.com/i/1530851

Contents of this Issue

Navigation

Page 8 of 22

C h a p t e r 1 | T h e N e e d f o r S e c u r i t y a n d C o m p l i a n c e While complying with security regulations may seem like a burdensome cost, such compliance can serve as a competitive advantage. As more industries adopt edge computing, customers are increasingly prioritizing security in their purchasing decisions. A company that demonstrates its compliance with strict security standards and its ability to protect customer data will stand out in a crowded market. NXP is supporting the growing need for security and compliance in edge devices by • Offering comprehensive root of trust technologies anchored in hardware to establish a security foundation for secure device commissioning, administration, operations, connections, updates, and maintenance throughout its lifecycle. • Pre-certifying edge processing platforms and mapping NXP security technology to market requirements, accelerating herewith OEM proof of conformance to security standards and regulations such as ISA/IEC 62443 (Industrial), EN 18031 (RED), and NIST 8425 (US Cyber Trust Mark). • Collaborating with regulators, policymakers, and industry standards bodies to foster a common approach to security and help OEMs simplify conformance to the multiple emerging regional regulations. In particular, NXP offers advanced security technologies such as • EdgeLock ® Secure Enclave, a dedicated security unit integrated into edge processing platforms. • EdgeLock ® Secure Elements, discrete IC for protection of device credentials. • EdgeLock ® 2GO, NXP cloud services for managing IoT device credentials (device access keys, device connection keys, device attestation certificates, etc.) over its lifecycle. Risks to edge computing are similar to overall information security concerns. Special emphasis needs to be put on data confidentiality, integrity, availability, and the security of identities from both the client and server perspectives." Asad Haque Executive Director, Security Architecture, Comcast 9 7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge

Articles in this issue

Links on this page

view archives of Supplier eBooks - NXP - 7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge