Cybersecurity: the case for hardware-based threat detection and mitigation
One mechanism for detecting suspicious transactions is to implement advanced security functionality in the operating system or hypervisor of each processor core in each chip and the wider system. While this is likely necessary, it is unlikely to be sufficient. Detecting these intrusions effectively throughout the life of the system requires monitoring at the hardware level.
By implementing the hardware-based security features of the Embedded Analytics platform – responsive security IP, a unique range of on-chip monitors, a secure message infrastructure and advanced threat mitigation enabled by combining the Embedded SDK with on- and off-chip analytics – mission-critical systems can be secured, by design, through their full lifecycle.