Version 2.0 features powerful security defences for critical intellectual property, secure chip-to-cloud integration and over-the-air (OTA) firmware update protection. Built on three pillars of product security – design, build and sustain, EmSPARK 2.0 provides device manufacturers with the firmware, tools and APIs needed to properly execute IoT protection.
The new version of EmSPARK provides a security framework that protects embedded firmware, keys and security-critical assets through the entire device lifecycle. It enables silicon hardware security features, secure device provisioning, and API access to essential trust services such as secure storage, firmware updates and payload verification.
EmSPARK 2.0 enables critical device security features on the IoT developer’s silicon; supporting secure boot, OTA updates, failovers and IP protection throughout the device’s lifecycle. Sequitur additionally supports customers’ implementations with non-recurring engineering (NRE) services for faster time to market.
The EmSPARK Security Suite was designed to address solutions in industries where embedded security is paramount such as industrial control, building automation, the smart home, machine vision, automotive communication, and medical devices.
Earlier this year, Sequitur Labs worked with Arrow Electronics on protecting security-conscious IoT edge devices with the debut of Arrow’s Shield96 board, a trusted Linux reference design that is equipped with EmSPARK to help customers create customised production-ready systems. With an increasing number of successful projects underway, Sequitur Labs is actively supporting Arrow with important embedded system security implementations.
“The greatest obstacle to a future serviced by smart devices is security, including aggressive new variants that attack endpoints at the edge and threaten embedded computing systems,” said Philip Attfield, Co-founder and CEO, Sequitur Labs. “Up until now, addressing these threats has been difficult and expensive. With EmSPARK 2.0, we make implementing device-level security easy by addressing the technical, IP, supply chain and business process challenges of IoT security. Now Developers can easily build applications that use secure resources without having to become experts in cryptography and complex hardware security technologies."