85609 Dornach b. München, de
+49 (2405) 45267-20
AMD Strengthens Security Solutions through Technology Partnership with ARM
Industry-first Collaboration to Extend ARM TrustZone Security Technology into x86-based AMD Offerings, Enabling More Secure Computing Experiences and Significantly Expanding the Security Ecosystem
By adopting the industry-standard approach to security that TrustZone technology embodies, AMD and ARM will provide a consistent approach to security spanning billions of Internet-connected mobile devices, tablets, PCs and servers whether they are powered by ARM processor-based solutions or AMD x86 APUs. AMD plans to provide development platforms that have TrustZone security features on select APUs in 2013, expanding further across its product portfolio in 2014. In a presentation this week at the AMD Fusion Developer Summit 2012 (AFDS), AMD Senior Vice President and Chief Information Officer Mike Wolfe described AMD's vision to advance computing security by enhancing AMD's existing security technologies. This is expected to include developing a platform security processor using an ARM Cortex(TM) -A5 CPU that features TrustZone technology, to monitor and help protect against malicious access to sensitive data and operations at the hardware level.
"With AMD's support for, and inclusion in, the expanding TrustZone ecosystem, consumers and businesses can rest assured their data and content are secured by an industry-standard security solution that spans a multitude of devices and operating systems, said Wolfe. This example of AMD's ambidextrous strategy, which leverages our history of x86 and graphics innovation while also embracing other technologies and intellectual property, will help drive a more secure computing experience for our consumer and business customers."
"As technology becomes more important to our everyday lives, security needs to be present in every single device. The challenge that the industry faces is how to make this a reality," said Ian Drew, executive vice president, strategy, ARM. "Through this technology partnership with AMD, and the broadening of the ARM TrustZone technology ecosystem, we're making another important step towards a solution. The aim is to make security accessible and consistent for consumers and business users across all computing devices."
Industry Support Demonstrates Market Need
In recognition of the first time hardware will be aligned to an industry-standard security solution between multiple processor architectures, the technology partnership has garnered wide support from industry leaders and influencers.
"At Alipay, we strive to provide safe and reliable online payment services to hundreds of millions of registered users for the tens of millions of transactions they make every day," said Stephen Zhu, senior director, Alipay. "By incorporating security at the hardware level, AMD and ARM are providing an added level of protection and taking us one step closer to achieving this goal."
"Hardly a week goes by without the emergence of another scary story regarding stolen identities or some other computer-related security breach - such as last week's hack of social career networking website LinkedIn that resulted in millions of stolen passwords," observed Nathan Brookwood, Research Fellow at Insight 64. "The bad guys have figured out that it's easier to steal money from a bank's computers than from the bank itself. AMD's move to integrate ARM's TrustZone technology into future APUs will allow systems containing those APUs to attain the same level of hardware-enforced security as today's most advanced devices, and will allow the users of those systems to sleep more soundly at night."
ARM TrustZone Brings Security to Millions of Devices
ARM TrustZone technology - a system-wide approach to security - is a key component of the ARM architecture and is integrated into the ARM Cortex-A processor series. Launched in 2004, TrustZone is a result of ongoing co-development that ARM carries out with a wide range of companies and has been implemented in a wide array of devices to date. The aim of the TrustZone ecosystem is to drive industry alignment and scalability. This will enable billions of TrustZone technology-based devices to meet the system security needs of consumers, service providers, enterprises and device manufacturers.
- Visit AMD.com to learn more about AMD and its products, or AMD Blogs for the latest on what's going on in and around the company
- A live video webcast of the AFDS presentations, with recorded playback, can be accessed at http://www.inxpo.com/...
- Follow all the news from the AMD on Twitter at @AMD_Unprocessed or like us on Facebook
- Learn more about ARM TrustZone technology and ARM Cortex Series processors
This presentation contains forward-looking statements, concerning among other things, the integration of TrustZone security features in our product platforms and the timing of that integration, AMD's vision and strategy regarding computing security, the development of platform security processor which are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act. Forward-looking statements are commonly identified by words such as "would," "may," "expects," "believes," "plans," "intends," "projects," and other terms with similar meaning. Investors are cautioned that the forward-looking statements in this presentation are based on current beliefs, assumptions and expectations, speak only as of the date of this presentation and involve risks and uncertainties that could cause actual results to differ materially from current expectations. Risks include the possibility that Intel Corporation's pricing, marketing and rebating programs, product bundling, standard setting, new product introductions or other activities may negatively impact the company's plans; the company will be unable to develop, launch and ramp new products and technologies in the volumes required by the market and at mature yields on a timely basis; that the company's third party wafer foundries will be unable to transition the company's products to advanced manufacturing process technologies in a timely and effective way or to manufacture the company's products on a timely basis in sufficient quantities and using competitive technologies; the company will be unable to obtain sufficient manufacturing capacity or components to meet demand for its products or will not fully utilize the company's projected manufacturing capacity needs at GLOBALFOUNDRIES' (GF) manufacturing facilities in 2012 and beyond; that the company may be unable to realize the anticipated benefits of its fables business model or its relationship with GF because, among other things, the synergies expected from the transaction may not be fully realized or may take longer to realize than expected; that customers stop buying the company's products or materially reduce their operations or demand for the company's products; that the company may be unable to maintain the level of investment in research and development that is required to remain competitive; that there may be unexpected variations in market growth and demand for the company's products and technologies in light of the product mix that it may have available at any particular time or a decline in demand; that the company's substantial indebtedness could adversely affect its financial position and prevent it from implementing its strategy or fulfilling its contractual obligations; that the company will require additional funding and may be unable to raise sufficient capital on favorable terms, or at all; that global business and economic conditions will not improve or will worsen; demand for computers will be lower than currently expected; and the effect of political or economic instability, domestically or internationally, on the company's sales or supply chain. Investors are urged to review in detail the risks and uncertainties in the company's Securities and Exchange Commission filings, including but not limited to the Quarterly Report on Form 10-Q for the quarter ended March 31, 2012.
The use of information published here for personal information and editorial processing is generally free of charge. Please clarify any copyright issues with the stated publisher before further use. In the event of publication, please send a specimen copy to email@example.com.