Secure Wireless

Secure Wireless

Wireless devices are growing in popularity and deployments are increasing exponentially. With this growth, more sensitive information and data are being transferred over the airwaves. Designers need to be aware of the vulnerabilities of the various technologies in order to protect this critical information. Threats to these wireless devices come into focus as we look at the pairing process and device deployment. OEMs and customers need to have a plan and tools for device management and mutual authentication. A few wireless standards that have risen to the top include, Bluetooth Low Energy (BLE), Wi-Fi, ZigBee, Z-Wave, Sub-GHz and Near Field Communication (NFC). These technologies are becoming more commonly used in applications where sensitive information and data are being transferred. Data needs to be protected both in transit and at rest through encryption and secure communications. Common threats such as man in the middle attacks (MITM) and distributed denial of service (DDoS) are becoming regular events. These need to be prevented regardless of the wireless protocol.


Secure-Wireless-IoT



With the advent of wireless connectivity revolutionizing the way that devices and data centers communicate in next-generation industrial IoT applications – the need for reliable wireless transmission as well as enterprise grade security has risen as critical for developers. With the incredibly complex nature of secure functions such as secure boot, certificate storage, access control, and more – industrial IoT system designers are looking for a market proven wireless connectivity partner to lower their cost of ownership, and rapidly increase time to market in this space. Lantronix is a strategic ecosystem partner for Cypress and is a leader in this space providing reliable Wi-Fi/Bluetooth modules powered by Cypress wireless, along with a suite of built in device enterprise grade security software. Each Lantronix module featuring Cypress’ industry leading Wi-Fi and Bluetooth connectivity is pre-loaded with Lantronix’s InfiniShield™ Security Suite enabling secure boot, firmware updates, network attach, communications, storage and includes secure wireless network connectivity options with user-controlled access and ongoing support and updates.

To learn more, please visit the OnDemand Webinar.

0920 Lantronix

Webinar: Deploying Wireless Devices with Enterprise-Grade Security for the Industrial IoT

xPico Product Brief

With a growing number of devices connecting to the internet, security must be established between hardware, cloud applications and servers, and finally users and services. PSoC® 64 Secure MCUs integrate the award-winning, ultra-low power 6 architecture with well-structured open-source IoT platform software to deliver a secure solution that "just works". For secure IoT Device designs requiring Bluetooth Low Energy (BLE) connectivity, Cypress provides the PSoC® 64 BLE Secure Boot Prototyping Kit features one of the two PSoC® 64 product families – the Secure Boot family which targets developers wanting a pre-configured device root of trust. On-board is a certified module featuring a PSoC® 64 Secure Boot MCU with an integrated BLE radio. The full kit comes with 2 individual boards for multiple prototyping development trials. Leverage this kit along with Cypress’ Secure Boot SDK to quickly develop and easily secure, IoT applications.

Watch this brief video to see how Cypress and Arrow with PSoC® 64 can help you save time and reduce development costs for your secure solution.


Learn More

Hemos actualizado nuestra política de privacidad. Por favor tome un momento para revisar estos cambios. Al hacer clic en Acepto, usted está de acuerdo con la Politica de Privacidad de Arrow Electronics y sus condiciones de uso.

Nuestro sitio Web coloca cookies en su dispositivo para mejorar su experiencia y nuestro sitio. Lea más sobre las cookies que utilizamos y cómo desactivarlas aquió. Es posible que se utilicen las cookies y tecnologías de seguimiento con fines de marketing.
Al hacer clic en "Aceptar", usted está consintiendo la colocación de cookies en su dispositivo y el uso de tecnologías de seguimiento. Haga clic en "Leer más" a continuación para obtener más información e instrucciones sobre cómo desactivar las cookies y tecnologías de seguimiento. Si bien la aceptación de cookies y tecnologías de seguimiento es voluntaria, la desactivación de estos puede resultar en que el sitio web no funcione correctamente, y es posible que ciertos anuncios sean menos relevantes para usted.
Respetamos su privacidad. Lea nuestra política de privacidad aquió