*
*Home|Chinese|Japanese*About ARM|Forums|Events|News|Employment|Contact Us|Investors*
dotted rule
*ARM - the architecture for the digital worldARM - the architecture for the digital world
search
*
*
***
*MARKETS:PRODUCTS & SOLUTIONS:CONNECTED COMMUNITY:TECHNICAL SUPPORT:DOCUMENTATION*
*
products and solutions
*
*
****
*.Products & Solutions
*
*
 >>Home Page 
*
 .ARM Services 
*
 .RealView Development Tools 
*
 .Fabric IP 
*
 .On-chip Debug & Trace 
*
 .Multimedia 
*
 .Physical IP 
*
 .Processors 
*
 .Security Solutions 
*
  Security Solutions Overview 
*
  TrustZone Technology Overview 
*
*
 .Operating System Support 
*
 .Licensing 
*
 >>Markets 
*
 >>Books 
*
*
*

Security Solutions Overview

ask ARM*
*
*

Digital assets are found in many forms, owned by various stakeholders and are vulnerable to many types of threats of attack. The ARM® technology portfolio offers a range of foundations upon which to build varying levels of secure solutions for many industry sectors including: Media; Payments, PayTV, Point-of-Sale, USIM, Storage Cards, Identity Management and more.

Establishing the right level of security for a platform requires careful consideration of the security of each individual component and how they combine to form a complete solution. ARM produces a range of hardware and software components, each designed to form reliable building blocks for the complete security solution:

  • ARM SecurCore® SC100™SC200™ and SC300™ processors with tamper resistant performance required for emerging applications in smart cards, SIM, USIM, PayTV and so on
  • ARM application cores with ARM TrustZone® Technology as the basis of cost effective secure consumer devices, to enhance logical protection of software assets
  • ARM Fabric IP propagating security throughout the SoC facilitating the development of complete solutions
  • ARM TrustZone Software providing a standardized framework for security software promoting inter-changeability of components and interoperability of software and platforms

Deploying security in consumer devices requires not only these essential building blocks but may also be enhanced by complementary IP from security component providers, such as cryptographic accelerators and secure network services to securely deploy trusted applications.

Back to Top

*
SEE ALSO
***
 TrustZone Technology Overview>> 
   
 SecurCore>> 
   
*
RELATED
***
 ARM Connected Community>> 
   
*

 

**
*4 dots*Other ARM Websites
*
shadow *LEGAL STATEMENTshadow