- The first secure end-to-end platform from this tie-up will be the Shield96
- Arrow aims to augment Microchip’s smart, connected, secure portfolio with engineering services
Microchip Technology and Arrow Electronics have teamed up to simplify connectivity and security across industrial, smart building and energy markets. Arrow aims to augment Microchip’s smart, connected, secure portfolio with engineering services. This will be done so that the original equipment manufacturers (OEMs) can decrease their time to market.
This will also help to meet the requirements in recent government legislations and NIST IoT security guidelines. The first secure end-to-end platform from this tie-up will be the Shield96. The companies claimed that this platform will help OEMs to have the needed security foundation integrated into the reference design
Protection, data security, and individuals’ privacy
Mitch Little, senior vice president of worldwide client engagement at Microchip Technology said, “Technology, pervasively, is embedded in everything. Every industry and every system are being fundamentally shaped by connected edge technology — it is happening in our homes, our work and our factories. These intelligent edge systems are running fundamental and critical executions, and they must be secure.”
According to NIST, cybersecurity and privacy risks for IoT devices can be categorised in terms of three high-level risk mitigation goals. These are protection, data security, and individuals’ privacy. Microchip’s range of secure product include secured communication, crypto authentication, certificate management, cloud provisioning, data security, encryption services, secure boot and IP protection said the company.
Reduce risk in areas of certification and compliance
David West, senior vice president at Arrow said, “OEMs are embracing engineering service collaboration so that they can augment internal work teams to tackle new technology integration and reduce risk in areas of certification and compliance. Edge device and edge compute applications and systems must now be secured from the sensory layer all the way to the enterprise.”