NanoLock, Adesto Collaborate to Deliver Flash-to-Cloud Security for IoT Devices

February 27, 2020 Perry Cohen

NanoLock is collaborating with Adesto to strengthen flash-based embedded security and management solutions for low-density flash memory devices.

The solution provides a hardware root-of-trust in the device’s flash memory that blocks unauthorized modifications to prevent persistent control of the device. The control of flash updates is moved from the vulnerable remote edge device to a trusted entity in the utility data center, ensuring that only validated commands and updates will modify the flash. In addition, the hardware root-of-trust provides reliable and valuable data such as attack alerts, status reports, and detailed forensic data.

NanoLock’s technology protects connected edge devices from the moment they are created prohibiting malicious code from being written into the flash, and provides protection and monitoring throughout the device’s entire lifecycle. This approach is both processor-and operating system-agnostic and requires virtually zero system processing power, which is critical for power-sensitive IoT devices.

For more information, visit www.adestotech.com.

About the Author

Perry Cohen

Perry Cohen, associate editor for Embedded Computing Design, is responsible for web content editing and creation in addition to podcast production. He also assists with the publication’s social media efforts which include strategic posting, follower engagement, and social media analysis. Before joining the ECD editorial team, Perry has been published on both local and national news platforms including KTAR.com (Phoenix), ArizonaSports.com (Phoenix), AZFamily.com, Cronkite News, and MLB/MiLB among others. Perry received a BA in Journalism from the Walter Cronkite School of Journalism and Mass Communications at Arizona State university. He can be reached by email at perry.cohen@opensysmedia.com Follow Perry’s work and ECD content on his twitter account @pcohen21

Follow on Twitter Follow on Linkedin More Content by Perry Cohen
Previous Article
Rajant Kinetic Mesh: The Secret IIoT Ingredient to Make-or-Break Connectivity
Rajant Kinetic Mesh: The Secret IIoT Ingredient to Make-or-Break Connectivity

By using BreadCrumb nodes, Kinetic Mesh networks can create a full coverage connection over any required area.

Next Article
TYAN Shows Embedded Server Motherboards to Scale IoT Analytics for Network Edge at Embedded World 2020
TYAN Shows Embedded Server Motherboards to Scale IoT Analytics for Network Edge at Embedded World 2020

TYAN’s Tempest EX motherboards to address data analytics in mixed-criticality environments with compact siz...